<?xml version="1.0" encoding="UTF-8"?>
<?xml-stylesheet href="/stylesheet.xsl" type="text/xsl"?>
<rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:sy="http://purl.org/rss/1.0/modules/syndication/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:podcast="https://podcastindex.org/namespace/1.0">
  <channel>
    <atom:link rel="self" type="application/atom+xml" href="https://feeds.transistor.fm/gdpr-now" title="MP3 Audio"/>
    <atom:link rel="hub" href="https://pubsubhubbub.appspot.com/"/>
    <podcast:podping usesPodping="true"/>
    <title>GDPR Now!</title>
    <generator>Transistor (https://transistor.fm)</generator>
    <itunes:new-feed-url>https://feeds.transistor.fm/gdpr-now</itunes:new-feed-url>
    <description>GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy.   Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way.
Our episodes provide insightful information for business leaders and privacy professionals alike.  The hosts are joined by a range of specialists who discuss the latest news, developments and trends within data security and privacy.  
Whether you're a business owner or manager, privacy expert, a privacy beginner or you just want to know more, this is the podcast for you!
Come and join us today!</description>
    <copyright>© 2023 Data Protection 4 Business Limited</copyright>
    <podcast:guid>ee05a3de-91d1-5afe-9a39-c18d92bdd612</podcast:guid>
    <podcast:locked owner="info@dpo4business.co.uk">no</podcast:locked>
    <language>en-gb</language>
    <pubDate>Mon, 01 Dec 2025 17:30:01 +0000</pubDate>
    <lastBuildDate>Mon, 01 Dec 2025 17:31:07 +0000</lastBuildDate>
    <link>https://gdprnow.fireside.fm</link>
    <image>
      <url>https://img.transistor.fm/-sjfhc4qQNDOfRYq5JtbEEL5eEoCbDwD1Zc75t4V8Eg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzM3NjU3LzE2NzM0/NTIxNjQtYXJ0d29y/ay5qcGc.jpg</url>
      <title>GDPR Now!</title>
      <link>https://gdprnow.fireside.fm</link>
    </image>
    <itunes:category text="News">
      <itunes:category text="Business News"/>
    </itunes:category>
    <itunes:category text="Business">
      <itunes:category text="Management"/>
    </itunes:category>
    <itunes:type>episodic</itunes:type>
    <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
    <itunes:image href="https://img.transistor.fm/-sjfhc4qQNDOfRYq5JtbEEL5eEoCbDwD1Zc75t4V8Eg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9zaG93/LzM3NjU3LzE2NzM0/NTIxNjQtYXJ0d29y/ay5qcGc.jpg"/>
    <itunes:summary>GDPR Now! is brought to you by Data Protection 4 Business and focuses on Data Protection regulations and all issues related to data security and privacy.   Our goal is to discuss important topics which help businesses comply with data protection regulations while protecting their business interests in a practical and pragmatic way.
Our episodes provide insightful information for business leaders and privacy professionals alike.  The hosts are joined by a range of specialists who discuss the latest news, developments and trends within data security and privacy.  
Whether you're a business owner or manager, privacy expert, a privacy beginner or you just want to know more, this is the podcast for you!
Come and join us today!</itunes:summary>
    <itunes:subtitle>GDPR Now.</itunes:subtitle>
    <itunes:keywords>data security, GDPR, data breaches, data protection, IT security, cyber security, DLP, outsourced DPO, data protection officer</itunes:keywords>
    <itunes:owner>
      <itunes:name>Karen Heaton/Data Protection 4 Business</itunes:name>
    </itunes:owner>
    <itunes:complete>No</itunes:complete>
    <itunes:explicit>No</itunes:explicit>
    <item>
      <title>5. Data Security. "Ctrl + Alt + Secure".   Pulling your security together. </title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>5. Data Security. "Ctrl + Alt + Secure".   Pulling your security together. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">21683cc5-7862-443f-9938-a585efe374ee</guid>
      <link>https://share.transistor.fm/s/9e41a496</link>
      <description>
        <![CDATA[Welcome!...to '<strong>G</strong>etting to <strong>G</strong>rips with <strong>D</strong>ata <strong>S</strong>ecurity' our podcast for anyone interested in learning more about how to <strong><em>'beat the hackers'</em></strong> using the best types of information security controls. <p><br>This new <strong>5 part series</strong> covers all aspects of data security for businesses where we discuss:  Ep 1: <strong>Strategy</strong>; Ep 2: <strong>Cloud Controls</strong>; Ep 3: <strong>People Risk</strong>; Ep 4: <strong>Using Tools you (already) have</strong> and Ep 5: <strong>Pulling IT security together</strong> in a coherent way.  The episodes feature Stuart and Darron from <a href="https://www.provisionit.co.uk/">ProvisionIT</a> who provide an invaluable range of tips and suggestions for setting up and maintaining data security in your organisation. </p>In this Episode 5, we talk about <strong>Pulling IT security together</strong>, in a coherent and useful manner.  We discuss the benefits of having an actionable Data Security policy in order to reduce risks, save costs and build Client trust in your organisation.  <p><br>We also provide a link to access a number of useful procedural templates to get you started!</p><p>Enjoy!!</p><p><strong><em>Karen</em></strong><br>Karen Heaton (Host)<br><a href="https://www.dpo4business.co.uk/">Data Protection 4 Business</a></p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[Welcome!...to '<strong>G</strong>etting to <strong>G</strong>rips with <strong>D</strong>ata <strong>S</strong>ecurity' our podcast for anyone interested in learning more about how to <strong><em>'beat the hackers'</em></strong> using the best types of information security controls. <p><br>This new <strong>5 part series</strong> covers all aspects of data security for businesses where we discuss:  Ep 1: <strong>Strategy</strong>; Ep 2: <strong>Cloud Controls</strong>; Ep 3: <strong>People Risk</strong>; Ep 4: <strong>Using Tools you (already) have</strong> and Ep 5: <strong>Pulling IT security together</strong> in a coherent way.  The episodes feature Stuart and Darron from <a href="https://www.provisionit.co.uk/">ProvisionIT</a> who provide an invaluable range of tips and suggestions for setting up and maintaining data security in your organisation. </p>In this Episode 5, we talk about <strong>Pulling IT security together</strong>, in a coherent and useful manner.  We discuss the benefits of having an actionable Data Security policy in order to reduce risks, save costs and build Client trust in your organisation.  <p><br>We also provide a link to access a number of useful procedural templates to get you started!</p><p>Enjoy!!</p><p><strong><em>Karen</em></strong><br>Karen Heaton (Host)<br><a href="https://www.dpo4business.co.uk/">Data Protection 4 Business</a></p><p><br></p>]]>
      </content:encoded>
      <pubDate>Mon, 01 Dec 2025 17:30:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/9e41a496/76a05f9b.mp3" length="35178738" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/sxc2aK7p-PfyzlD-4-W6OTQW1BeYu7NGV1ds-ealoVw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81ZmY3/M2Y1NTcwNDI4MWRk/MTA1YmEzYzNlYTYw/ODNlNy5wbmc.jpg"/>
      <itunes:duration>1256</itunes:duration>
      <itunes:summary>
        <![CDATA[Welcome!...to '<strong>G</strong>etting to <strong>G</strong>rips with <strong>D</strong>ata <strong>S</strong>ecurity' our podcast for anyone interested in learning more about how to <strong><em>'beat the hackers'</em></strong> using the best types of information security controls. <p><br>This new <strong>5 part series</strong> covers all aspects of data security for businesses where we discuss:  Ep 1: <strong>Strategy</strong>; Ep 2: <strong>Cloud Controls</strong>; Ep 3: <strong>People Risk</strong>; Ep 4: <strong>Using Tools you (already) have</strong> and Ep 5: <strong>Pulling IT security together</strong> in a coherent way.  The episodes feature Stuart and Darron from <a href="https://www.provisionit.co.uk/">ProvisionIT</a> who provide an invaluable range of tips and suggestions for setting up and maintaining data security in your organisation. </p>In this Episode 5, we talk about <strong>Pulling IT security together</strong>, in a coherent and useful manner.  We discuss the benefits of having an actionable Data Security policy in order to reduce risks, save costs and build Client trust in your organisation.  <p><br>We also provide a link to access a number of useful procedural templates to get you started!</p><p>Enjoy!!</p><p><strong><em>Karen</em></strong><br>Karen Heaton (Host)<br><a href="https://www.dpo4business.co.uk/">Data Protection 4 Business</a></p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>itpolicy; securitystandard; securitycontrols; itcertification; datasecurity; itstrategy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://www.provisionit.co.uk/our-co-founders" img="https://img.transistor.fm/-Rza4eHqI7reSSz5MqhY4Rbha9w8gI3-k5cQJfWGvVs/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZDky/NTgzYmJkYmQ5MWU2/N2I0Y2UzMjg3Y2I1/NTRhNC5qcGVn.jpg">Darron Tate</podcast:person>
      <podcast:person role="Host" href="https://gdprnow.transistor.fm/" img="https://img.transistor.fm/kZ3qhm8GhYUGrgeB7ZLDz9tUt2hIF6m2W9lMdHB2ces/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lY2E3/OTRjNzQ4OGJjODZj/MGE3ZmJkODUwMmM5/M2MyNC5qcGc.jpg">Karen Heaton</podcast:person>
      <podcast:person role="Guest" href="https://www.provisionit.co.uk/our-co-founders" img="https://img.transistor.fm/C0zB0tzWJWNfF0XYM-8vzNIBqpNvRBKwTnUTd8HYqU4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yOTRi/MmFkYmQ5MzgxNjk5/NDU2MDllZTMwMmMw/Y2QxYy5qcGVn.jpg">Stuart Wistance</podcast:person>
    </item>
    <item>
      <title>4. Data Security. Locked and Loaded.  Using security tools you have. </title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>4. Data Security. Locked and Loaded.  Using security tools you have. </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b9bf3a5b-e611-4f83-b108-6c424efd188c</guid>
      <link>https://share.transistor.fm/s/4b22b41e</link>
      <description>
        <![CDATA[Welcome!...to '<strong>G</strong>etting to <strong>G</strong>rips with <strong>D</strong>ata <strong>S</strong>ecurity' our podcast for anyone interested in learning more about how to <strong><em>'beat the hackers'</em></strong> using the best types of information security controls. <p><br>This new <strong>5 part series</strong> covers all aspects of data security for businesses where we discuss:  Ep 1: <strong>Strategy</strong>; Ep 2: <strong>Cloud Controls</strong>; Ep 3: <strong>People Risk</strong>; Ep 4: <strong>Using Tools you (already) have</strong> and Ep 5: <strong>Pulling IT together</strong> in a coherent way.  The episodes feature Stuart and Darron from <a href="https://www.provisionit.co.uk/">ProvisionIT</a> who provide an invaluable range of tips and suggestions for setting up and maintaining data security in your organisation. </p>In this Episode 4, we talk about <strong>Using Tools and Features you may already have</strong> (and pay for!).  We explain various Microsoft365 security features and outline which licensed products you need to have in order to implement them.  <p><br>Enjoy!!</p><p><strong><em>Karen</em></strong><br>Karen Heaton (Host)<br><a href="https://www.dpo4business.co.uk/">Data Protection 4 Business</a></p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[Welcome!...to '<strong>G</strong>etting to <strong>G</strong>rips with <strong>D</strong>ata <strong>S</strong>ecurity' our podcast for anyone interested in learning more about how to <strong><em>'beat the hackers'</em></strong> using the best types of information security controls. <p><br>This new <strong>5 part series</strong> covers all aspects of data security for businesses where we discuss:  Ep 1: <strong>Strategy</strong>; Ep 2: <strong>Cloud Controls</strong>; Ep 3: <strong>People Risk</strong>; Ep 4: <strong>Using Tools you (already) have</strong> and Ep 5: <strong>Pulling IT together</strong> in a coherent way.  The episodes feature Stuart and Darron from <a href="https://www.provisionit.co.uk/">ProvisionIT</a> who provide an invaluable range of tips and suggestions for setting up and maintaining data security in your organisation. </p>In this Episode 4, we talk about <strong>Using Tools and Features you may already have</strong> (and pay for!).  We explain various Microsoft365 security features and outline which licensed products you need to have in order to implement them.  <p><br>Enjoy!!</p><p><strong><em>Karen</em></strong><br>Karen Heaton (Host)<br><a href="https://www.dpo4business.co.uk/">Data Protection 4 Business</a></p><p><br></p>]]>
      </content:encoded>
      <pubDate>Thu, 27 Nov 2025 05:27:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/4b22b41e/ac518b13.mp3" length="76426850" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/PP7ypaAUWwkUgmy_zhpyTl_zS3S17nsMKxlfpp3GiWg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS81YTJj/NjNkYzEyODNhMjUz/OGM3NTA5YjQ2OTY3/ZjQ2ZS5wbmc.jpg"/>
      <itunes:duration>2388</itunes:duration>
      <itunes:summary>
        <![CDATA[Welcome!...to '<strong>G</strong>etting to <strong>G</strong>rips with <strong>D</strong>ata <strong>S</strong>ecurity' our podcast for anyone interested in learning more about how to <strong><em>'beat the hackers'</em></strong> using the best types of information security controls. <p><br>This new <strong>5 part series</strong> covers all aspects of data security for businesses where we discuss:  Ep 1: <strong>Strategy</strong>; Ep 2: <strong>Cloud Controls</strong>; Ep 3: <strong>People Risk</strong>; Ep 4: <strong>Using Tools you (already) have</strong> and Ep 5: <strong>Pulling IT together</strong> in a coherent way.  The episodes feature Stuart and Darron from <a href="https://www.provisionit.co.uk/">ProvisionIT</a> who provide an invaluable range of tips and suggestions for setting up and maintaining data security in your organisation. </p>In this Episode 4, we talk about <strong>Using Tools and Features you may already have</strong> (and pay for!).  We explain various Microsoft365 security features and outline which licensed products you need to have in order to implement them.  <p><br>Enjoy!!</p><p><strong><em>Karen</em></strong><br>Karen Heaton (Host)<br><a href="https://www.dpo4business.co.uk/">Data Protection 4 Business</a></p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>zerotrust; devicemanagement; msentra; conditionalaccess; cybersecurity; msdefender; mssecurescore;backups</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://www.provisionit.co.uk/our-co-founders" img="https://img.transistor.fm/-Rza4eHqI7reSSz5MqhY4Rbha9w8gI3-k5cQJfWGvVs/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZDky/NTgzYmJkYmQ5MWU2/N2I0Y2UzMjg3Y2I1/NTRhNC5qcGVn.jpg">Darron Tate</podcast:person>
      <podcast:person role="Guest" href="https://www.provisionit.co.uk/our-co-founders" img="https://img.transistor.fm/C0zB0tzWJWNfF0XYM-8vzNIBqpNvRBKwTnUTd8HYqU4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yOTRi/MmFkYmQ5MzgxNjk5/NDU2MDllZTMwMmMw/Y2QxYy5qcGVn.jpg">Stuart Wistance</podcast:person>
      <podcast:person role="Host" href="https://gdprnow.transistor.fm/" img="https://img.transistor.fm/kZ3qhm8GhYUGrgeB7ZLDz9tUt2hIF6m2W9lMdHB2ces/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lY2E3/OTRjNzQ4OGJjODZj/MGE3ZmJkODUwMmM5/M2MyNC5qcGc.jpg">Karen Heaton</podcast:person>
    </item>
    <item>
      <title>3. Data Security. The Human Error Show</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>3. Data Security. The Human Error Show</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">21b9457c-ef57-4641-a7e8-e1eec7131474</guid>
      <link>https://share.transistor.fm/s/ca99572f</link>
      <description>
        <![CDATA[Welcome!...to '<strong>G</strong>etting to <strong>G</strong>rips with <strong>D</strong>ata <strong>S</strong>ecurity' our podcast for anyone interested in learning more about how to <strong><em>'beat the hackers'</em></strong> using the best types of information security controls. <p><br>This new <strong>5 part series</strong> covers all aspects of data security for businesses where we discuss:  Ep 1: <strong>Strategy</strong>; Ep 2: <strong>Cloud Controls</strong>; Ep 3: <strong>People Risk</strong>; Ep 4: <strong>Using Tools you (already) have</strong> and Ep 5: <strong>Pulling IT together</strong> in a coherent way.  The episodes feature Stuart and Darron from <a href="https://www.provisionit.co.uk/">ProvisionIT</a> who provide an invaluable range of tips and suggestions for setting up and maintaining data security in your organisation. </p>In this Episode 3, we talk about the <strong>Risks with People</strong> and explain how to set appropriate technical controls to restrict risky activities and implement tools to monitor the movement of data. <p><br>Enjoy!!</p><p><strong><em>Karen</em></strong><br>Karen Heaton (Host)<br><a href="https://www.dpo4business.co.uk/">Data Protection 4 Business</a></p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[Welcome!...to '<strong>G</strong>etting to <strong>G</strong>rips with <strong>D</strong>ata <strong>S</strong>ecurity' our podcast for anyone interested in learning more about how to <strong><em>'beat the hackers'</em></strong> using the best types of information security controls. <p><br>This new <strong>5 part series</strong> covers all aspects of data security for businesses where we discuss:  Ep 1: <strong>Strategy</strong>; Ep 2: <strong>Cloud Controls</strong>; Ep 3: <strong>People Risk</strong>; Ep 4: <strong>Using Tools you (already) have</strong> and Ep 5: <strong>Pulling IT together</strong> in a coherent way.  The episodes feature Stuart and Darron from <a href="https://www.provisionit.co.uk/">ProvisionIT</a> who provide an invaluable range of tips and suggestions for setting up and maintaining data security in your organisation. </p>In this Episode 3, we talk about the <strong>Risks with People</strong> and explain how to set appropriate technical controls to restrict risky activities and implement tools to monitor the movement of data. <p><br>Enjoy!!</p><p><strong><em>Karen</em></strong><br>Karen Heaton (Host)<br><a href="https://www.dpo4business.co.uk/">Data Protection 4 Business</a></p><p><br></p>]]>
      </content:encoded>
      <pubDate>Tue, 25 Nov 2025 17:28:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/ca99572f/116d4008.mp3" length="62435942" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/8x1xhWqXxG2tsTPzVEWhn2quoCmyWgD59m_Sacv7URQ/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9iNzJm/MTM5NjE0Y2VlNTFm/ZDlkMGYxYzViNzIz/NmJmNi5wbmc.jpg"/>
      <itunes:duration>1951</itunes:duration>
      <itunes:summary>
        <![CDATA[Welcome!...to '<strong>G</strong>etting to <strong>G</strong>rips with <strong>D</strong>ata <strong>S</strong>ecurity' our podcast for anyone interested in learning more about how to <strong><em>'beat the hackers'</em></strong> using the best types of information security controls. <p><br>This new <strong>5 part series</strong> covers all aspects of data security for businesses where we discuss:  Ep 1: <strong>Strategy</strong>; Ep 2: <strong>Cloud Controls</strong>; Ep 3: <strong>People Risk</strong>; Ep 4: <strong>Using Tools you (already) have</strong> and Ep 5: <strong>Pulling IT together</strong> in a coherent way.  The episodes feature Stuart and Darron from <a href="https://www.provisionit.co.uk/">ProvisionIT</a> who provide an invaluable range of tips and suggestions for setting up and maintaining data security in your organisation. </p>In this Episode 3, we talk about the <strong>Risks with People</strong> and explain how to set appropriate technical controls to restrict risky activities and implement tools to monitor the movement of data. <p><br>Enjoy!!</p><p><strong><em>Karen</em></strong><br>Karen Heaton (Host)<br><a href="https://www.dpo4business.co.uk/">Data Protection 4 Business</a></p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>credentialmanagement; conditionalaccess; m365security; datalossprevention; documentcontrols; emailcontrols; devicemonitoring; byod; datasecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://gdprnow.transistor.fm/" img="https://img.transistor.fm/kZ3qhm8GhYUGrgeB7ZLDz9tUt2hIF6m2W9lMdHB2ces/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lY2E3/OTRjNzQ4OGJjODZj/MGE3ZmJkODUwMmM5/M2MyNC5qcGc.jpg">Karen Heaton</podcast:person>
      <podcast:person role="Guest" href="https://www.provisionit.co.uk/our-co-founders" img="https://img.transistor.fm/-Rza4eHqI7reSSz5MqhY4Rbha9w8gI3-k5cQJfWGvVs/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZDky/NTgzYmJkYmQ5MWU2/N2I0Y2UzMjg3Y2I1/NTRhNC5qcGVn.jpg">Darron Tate</podcast:person>
      <podcast:person role="Guest" href="https://www.provisionit.co.uk/our-co-founders" img="https://img.transistor.fm/C0zB0tzWJWNfF0XYM-8vzNIBqpNvRBKwTnUTd8HYqU4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yOTRi/MmFkYmQ5MzgxNjk5/NDU2MDllZTMwMmMw/Y2QxYy5qcGVn.jpg">Stuart Wistance</podcast:person>
    </item>
    <item>
      <title>2. Data Security. Head in the Clouds.  (And hoping it's safe)</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>2. Data Security. Head in the Clouds.  (And hoping it's safe)</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cc658fa1-632d-4d7d-9b2a-f6ce312c23f1</guid>
      <link>https://share.transistor.fm/s/9762d244</link>
      <description>
        <![CDATA[Welcome!...to '<strong>G</strong>etting to <strong>G</strong>rips with <strong>D</strong>ata <strong>S</strong>ecurity' our podcast for anyone interested in learning more about how to <strong><em>'beat the hackers'</em></strong> using the best types of information security controls. <p><br>This new <strong>5 part series</strong> covers all aspects of data security for businesses where we discuss:  Ep 1: <strong>Strategy</strong>; Ep 2: <strong>Cloud Controls</strong>; Ep 3: <strong>People Risk</strong>; Ep 4: <strong>Using Tools you (already) have</strong> and Ep 5: <strong>Pulling IT together</strong> in a coherent way.  The episodes feature Stuart and Darron from <a href="https://www.provisionit.co.uk/">ProvisionIT</a> who provide an invaluable range of tips and suggestions for setting up and maintaining data security in your organisation. </p>In this Episode 2, we talk about <strong>Cloud Services</strong>, and bust the myth that <strong><em>"it's in the cloud, it's safe - right?"</em></strong> because <strong>it's not</strong> necessarily safe.  We explain why this is the case and the steps organisations need to take to ensure they understand the risks of using cloud-based services.  <p><br>Enjoy!!</p><p><strong><em>Karen</em></strong> <br>Karen Heaton (Host)<br><a href="https://www.dpo4business.co.uk/">Data Protection 4 Business</a></p><p><br></p>]]>
      </description>
      <content:encoded>
        <![CDATA[Welcome!...to '<strong>G</strong>etting to <strong>G</strong>rips with <strong>D</strong>ata <strong>S</strong>ecurity' our podcast for anyone interested in learning more about how to <strong><em>'beat the hackers'</em></strong> using the best types of information security controls. <p><br>This new <strong>5 part series</strong> covers all aspects of data security for businesses where we discuss:  Ep 1: <strong>Strategy</strong>; Ep 2: <strong>Cloud Controls</strong>; Ep 3: <strong>People Risk</strong>; Ep 4: <strong>Using Tools you (already) have</strong> and Ep 5: <strong>Pulling IT together</strong> in a coherent way.  The episodes feature Stuart and Darron from <a href="https://www.provisionit.co.uk/">ProvisionIT</a> who provide an invaluable range of tips and suggestions for setting up and maintaining data security in your organisation. </p>In this Episode 2, we talk about <strong>Cloud Services</strong>, and bust the myth that <strong><em>"it's in the cloud, it's safe - right?"</em></strong> because <strong>it's not</strong> necessarily safe.  We explain why this is the case and the steps organisations need to take to ensure they understand the risks of using cloud-based services.  <p><br>Enjoy!!</p><p><strong><em>Karen</em></strong> <br>Karen Heaton (Host)<br><a href="https://www.dpo4business.co.uk/">Data Protection 4 Business</a></p><p><br></p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Nov 2025 17:31:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/9762d244/cd329388.mp3" length="19715539" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/ZoJYyqeCEJeJg5LNLtmiMqq4f3pEbXklIx5FkOVeOTo/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8xNzQ3/MjBhMDk2YTc3YWJi/OTQyYzg1YmNiMzhi/OGU3NS5wbmc.jpg"/>
      <itunes:duration>2461</itunes:duration>
      <itunes:summary>
        <![CDATA[Welcome!...to '<strong>G</strong>etting to <strong>G</strong>rips with <strong>D</strong>ata <strong>S</strong>ecurity' our podcast for anyone interested in learning more about how to <strong><em>'beat the hackers'</em></strong> using the best types of information security controls. <p><br>This new <strong>5 part series</strong> covers all aspects of data security for businesses where we discuss:  Ep 1: <strong>Strategy</strong>; Ep 2: <strong>Cloud Controls</strong>; Ep 3: <strong>People Risk</strong>; Ep 4: <strong>Using Tools you (already) have</strong> and Ep 5: <strong>Pulling IT together</strong> in a coherent way.  The episodes feature Stuart and Darron from <a href="https://www.provisionit.co.uk/">ProvisionIT</a> who provide an invaluable range of tips and suggestions for setting up and maintaining data security in your organisation. </p>In this Episode 2, we talk about <strong>Cloud Services</strong>, and bust the myth that <strong><em>"it's in the cloud, it's safe - right?"</em></strong> because <strong>it's not</strong> necessarily safe.  We explain why this is the case and the steps organisations need to take to ensure they understand the risks of using cloud-based services.  <p><br>Enjoy!!</p><p><strong><em>Karen</em></strong> <br>Karen Heaton (Host)<br><a href="https://www.dpo4business.co.uk/">Data Protection 4 Business</a></p><p><br></p>]]>
      </itunes:summary>
      <itunes:keywords>cloudservices; securityrisks; saas; paas; iaas; itrisks; backups; credentialtheft</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://www.provisionit.co.uk/our-co-founders" img="https://img.transistor.fm/-Rza4eHqI7reSSz5MqhY4Rbha9w8gI3-k5cQJfWGvVs/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZDky/NTgzYmJkYmQ5MWU2/N2I0Y2UzMjg3Y2I1/NTRhNC5qcGVn.jpg">Darron Tate</podcast:person>
      <podcast:person role="Guest" href="https://www.provisionit.co.uk/our-co-founders" img="https://img.transistor.fm/C0zB0tzWJWNfF0XYM-8vzNIBqpNvRBKwTnUTd8HYqU4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yOTRi/MmFkYmQ5MzgxNjk5/NDU2MDllZTMwMmMw/Y2QxYy5qcGVn.jpg">Stuart Wistance</podcast:person>
      <podcast:person role="Host" href="https://gdprnow.transistor.fm/" img="https://img.transistor.fm/kZ3qhm8GhYUGrgeB7ZLDz9tUt2hIF6m2W9lMdHB2ces/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lY2E3/OTRjNzQ4OGJjODZj/MGE3ZmJkODUwMmM5/M2MyNC5qcGc.jpg">Karen Heaton</podcast:person>
    </item>
    <item>
      <title>1. Data Security.  Getting to Grips with Strategy.</title>
      <itunes:season>2</itunes:season>
      <podcast:season>2</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>1. Data Security.  Getting to Grips with Strategy.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">c8af040d-9726-4b97-878b-843100c290c4</guid>
      <link>https://share.transistor.fm/s/13ceadc7</link>
      <description>
        <![CDATA[Welcome!...to '<strong>G</strong>etting to <strong>G</strong>rips with <strong>D</strong>ata <strong>S</strong>ecurity' our podcast for anyone interested in learning more about how to <strong><em>'beat the hackers'</em></strong> using the best types of information security controls. <p><br>This new <strong>5 part series</strong> covers all aspects of data security for businesses where we discuss:  Ep 1: <strong>Strategy</strong>; Ep 2: <strong>Cloud Controls</strong>; Ep 3: <strong>People Risk</strong>; Ep 4: <strong>Using Tools you (already) have</strong> and Ep 5: <strong>Pulling IT together</strong> in a coherent way.  The episodes feature Stuart and Darron from <a href="https://www.provisionit.co.uk/">ProvisionIT</a> who provide an invaluable range of tips and suggestions for setting up and maintaining data security in your organisation. </p>In this Episode 1, we talk about Strategy, and answer the question: 'where do I begin?'.  We explain how to understand your data security landscape, the risks and practical next steps to take on your data security journey.  <p><br>Enjoy!!</p><p><strong><em>Karen</em></strong><br>Karen Heaton (Host)<br><a href="https://www.dpo4business.co.uk/">Data Protection 4 Business</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[Welcome!...to '<strong>G</strong>etting to <strong>G</strong>rips with <strong>D</strong>ata <strong>S</strong>ecurity' our podcast for anyone interested in learning more about how to <strong><em>'beat the hackers'</em></strong> using the best types of information security controls. <p><br>This new <strong>5 part series</strong> covers all aspects of data security for businesses where we discuss:  Ep 1: <strong>Strategy</strong>; Ep 2: <strong>Cloud Controls</strong>; Ep 3: <strong>People Risk</strong>; Ep 4: <strong>Using Tools you (already) have</strong> and Ep 5: <strong>Pulling IT together</strong> in a coherent way.  The episodes feature Stuart and Darron from <a href="https://www.provisionit.co.uk/">ProvisionIT</a> who provide an invaluable range of tips and suggestions for setting up and maintaining data security in your organisation. </p>In this Episode 1, we talk about Strategy, and answer the question: 'where do I begin?'.  We explain how to understand your data security landscape, the risks and practical next steps to take on your data security journey.  <p><br>Enjoy!!</p><p><strong><em>Karen</em></strong><br>Karen Heaton (Host)<br><a href="https://www.dpo4business.co.uk/">Data Protection 4 Business</a></p>]]>
      </content:encoded>
      <pubDate>Wed, 12 Nov 2025 14:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/13ceadc7/76213b33.mp3" length="57635533" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/evwPaE_5F_hv9kXQHU7XuTQLvxY9dCYh8ZoSFCFVkxI/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lMWJj/NmY0YTk5NWE5YzEz/YWMwYTAyOTA5MTQx/YzA4Yi5wbmc.jpg"/>
      <itunes:duration>1801</itunes:duration>
      <itunes:summary>
        <![CDATA[Welcome!...to '<strong>G</strong>etting to <strong>G</strong>rips with <strong>D</strong>ata <strong>S</strong>ecurity' our podcast for anyone interested in learning more about how to <strong><em>'beat the hackers'</em></strong> using the best types of information security controls. <p><br>This new <strong>5 part series</strong> covers all aspects of data security for businesses where we discuss:  Ep 1: <strong>Strategy</strong>; Ep 2: <strong>Cloud Controls</strong>; Ep 3: <strong>People Risk</strong>; Ep 4: <strong>Using Tools you (already) have</strong> and Ep 5: <strong>Pulling IT together</strong> in a coherent way.  The episodes feature Stuart and Darron from <a href="https://www.provisionit.co.uk/">ProvisionIT</a> who provide an invaluable range of tips and suggestions for setting up and maintaining data security in your organisation. </p>In this Episode 1, we talk about Strategy, and answer the question: 'where do I begin?'.  We explain how to understand your data security landscape, the risks and practical next steps to take on your data security journey.  <p><br>Enjoy!!</p><p><strong><em>Karen</em></strong><br>Karen Heaton (Host)<br><a href="https://www.dpo4business.co.uk/">Data Protection 4 Business</a></p>]]>
      </itunes:summary>
      <itunes:keywords>datasecurity; itstrategy; cyberinsurance; itsystems; peoplerisk; toolsets; attackvectors; socialengineering</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Guest" href="https://www.provisionit.co.uk/our-co-founders" img="https://img.transistor.fm/C0zB0tzWJWNfF0XYM-8vzNIBqpNvRBKwTnUTd8HYqU4/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS8yOTRi/MmFkYmQ5MzgxNjk5/NDU2MDllZTMwMmMw/Y2QxYy5qcGVn.jpg">Stuart Wistance</podcast:person>
      <podcast:person role="Guest" href="https://www.provisionit.co.uk/our-co-founders" img="https://img.transistor.fm/-Rza4eHqI7reSSz5MqhY4Rbha9w8gI3-k5cQJfWGvVs/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS82ZDky/NTgzYmJkYmQ5MWU2/N2I0Y2UzMjg3Y2I1/NTRhNC5qcGVn.jpg">Darron Tate</podcast:person>
      <podcast:person role="Host" href="https://gdprnow.transistor.fm/" img="https://img.transistor.fm/kZ3qhm8GhYUGrgeB7ZLDz9tUt2hIF6m2W9lMdHB2ces/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lY2E3/OTRjNzQ4OGJjODZj/MGE3ZmJkODUwMmM5/M2MyNC5qcGc.jpg">Karen Heaton</podcast:person>
    </item>
    <item>
      <title>Cyber Security Tips for businesses </title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>36</itunes:episode>
      <podcast:episode>36</podcast:episode>
      <itunes:title>Cyber Security Tips for businesses </itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3bfedae4-6fc0-4bd5-ad48-0dc0d8fe58e1</guid>
      <link>https://share.transistor.fm/s/3a4b5dae</link>
      <description>
        <![CDATA[<p>In this episode we are delighted to have Andrew Alston, founding director at Breach Aware and Business Intelligence Theoroms.  </p><p>Andrew brings us up to date on the current cyber security issues affecting businesses and offers a range of easy to action steps businesses can take to protect their systems and data. He reminds us that the basic security steps, done well, can go a long way to preventing security issues. </p><p>As always, we present affordable solutions that can be used for SME's and individuals as well as large organisations.</p><p>GDPR Now! Is brought to you by Data Protection 4 Business<br>**www.dpo4business.co.uk**</p><p>**Guest**<br>Andrew Alston<br>Founding Director<br>Breach Aware<br>Andrew@BITs.Company</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode we are delighted to have Andrew Alston, founding director at Breach Aware and Business Intelligence Theoroms.  </p><p>Andrew brings us up to date on the current cyber security issues affecting businesses and offers a range of easy to action steps businesses can take to protect their systems and data. He reminds us that the basic security steps, done well, can go a long way to preventing security issues. </p><p>As always, we present affordable solutions that can be used for SME's and individuals as well as large organisations.</p><p>GDPR Now! Is brought to you by Data Protection 4 Business<br>**www.dpo4business.co.uk**</p><p>**Guest**<br>Andrew Alston<br>Founding Director<br>Breach Aware<br>Andrew@BITs.Company</p>]]>
      </content:encoded>
      <pubDate>Wed, 11 Jan 2023 16:15:03 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/3a4b5dae/93b7ebee.mp3" length="54593596" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:duration>1949</itunes:duration>
      <itunes:summary>This podcast is brought to you by Data Protection 4 Business.  All suggestions for topics, improvement etc are gratefully received.  If you want to appear on the podcast, please contact us at info@dpo4business.co.uk</itunes:summary>
      <itunes:subtitle>This podcast is brought to you by Data Protection 4 Business.  All suggestions for topics, improvement etc are gratefully received.  If you want to appear on the podcast, please contact us at info@dpo4business.co.uk</itunes:subtitle>
      <itunes:keywords>data security, GDPR, data breaches, data protection, IT security, cyber security, DLP, outsourced DPO, data protection officer</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
      <podcast:person role="Host" href="https://gdprnow.transistor.fm/" img="https://img.transistor.fm/kZ3qhm8GhYUGrgeB7ZLDz9tUt2hIF6m2W9lMdHB2ces/rs:fill:0:0:1/w:800/h:800/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lY2E3/OTRjNzQ4OGJjODZj/MGE3ZmJkODUwMmM5/M2MyNC5qcGc.jpg">Karen Heaton</podcast:person>
    </item>
    <item>
      <title>Episode 35: Online content - how to protect and secure your digital rights</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>35</itunes:episode>
      <podcast:episode>35</podcast:episode>
      <itunes:title>Episode 35: Online content - how to protect and secure your digital rights</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">34ffdff3-183e-471b-a2ee-f7a0b9cd876d</guid>
      <link>https://share.transistor.fm/s/3b1f5831</link>
      <description>
        <![CDATA[<p>Online Content - how to protect and secure your digital rights</p>

<p>In today's world of content creation, sharing, posting and blogging, it is more important than ever to be able to protect and control your online content.  Whether you are a musician, artist, parent, small business or large organisation, your digital content is who you are as an individual, family, group or company.</p>

<p>This episode is a fantastic insight into the world of managing and controlling your online content with our guest, Adam Rumanek, Founder and CEO of Aux Mode, global specialists in digital rights management and revenue reporting.</p>

<p>We discuss: digital rights management - what is it? -  how can you protect your online content; video privacy protection; audio privacy protection and understanding your rights on YouTube.  Anyone with an online presence will learn from listening to this episode, so we are grateful to Adam for his advice.</p>

<p><strong>Guest</strong><br>
Adam Rumanek, CEO<br>
Aux Mode<br>
 <a href="https://auxmode.com/about-us" rel="nofollow">https://auxmode.com/about-us</a> or contact Adam Rumanek on <a href="mailto:adamr@auxmode.com" rel="nofollow">adamr@auxmode.com</a> </p>

<p><strong>GDPR Now! Is brought to you by Data Protection 4 Business</strong><br>
<a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></p><p>Special Guest: Adam Rumanek.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Online Content - how to protect and secure your digital rights</p>

<p>In today's world of content creation, sharing, posting and blogging, it is more important than ever to be able to protect and control your online content.  Whether you are a musician, artist, parent, small business or large organisation, your digital content is who you are as an individual, family, group or company.</p>

<p>This episode is a fantastic insight into the world of managing and controlling your online content with our guest, Adam Rumanek, Founder and CEO of Aux Mode, global specialists in digital rights management and revenue reporting.</p>

<p>We discuss: digital rights management - what is it? -  how can you protect your online content; video privacy protection; audio privacy protection and understanding your rights on YouTube.  Anyone with an online presence will learn from listening to this episode, so we are grateful to Adam for his advice.</p>

<p><strong>Guest</strong><br>
Adam Rumanek, CEO<br>
Aux Mode<br>
 <a href="https://auxmode.com/about-us" rel="nofollow">https://auxmode.com/about-us</a> or contact Adam Rumanek on <a href="mailto:adamr@auxmode.com" rel="nofollow">adamr@auxmode.com</a> </p>

<p><strong>GDPR Now! Is brought to you by Data Protection 4 Business</strong><br>
<a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></p><p>Special Guest: Adam Rumanek.</p>]]>
      </content:encoded>
      <pubDate>Tue, 08 Mar 2022 17:45:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/3b1f5831/c27a1245.mp3" length="53397257" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/SN9XmBx_dMAiO9lxiUqy1FD2A0VxxwaiJssceSylAgM/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQzMTEv/MTY3MzQ1MjI1Ny1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1901</itunes:duration>
      <itunes:summary>Online Content - how to protect and secure your digital rights

In today's world of content creation, sharing, posting and blogging, it is more important than ever to be able to protect and control your online content.  Whether you are a musician, artist, parent, small business or large organisation, your digital content is who you are as an individual, family, group or company.

This episode is a fantastic insight into the world of managing and controlling your online content with our guest, Adam Rumanek, Founder and CEO of Aux Mode, global specialists in digital rights management and revenue reporting.

We discuss: digital rights management - what is it? -  how can you protect your online content; video privacy protection; audio privacy protection and understanding your rights on YouTube.  Anyone with an online presence will learn from listening to this episode, so we are grateful to Adam for his advice.

Guest
Adam Rumanek, CEO
Aux Mode
 https://auxmode.com/about-us or contact Adam Rumanek on adamr@auxmode.com 

GDPR Now! Is brought to you by Data Protection 4 Business
www.dpo4business.co.ukSpecial Guest: Adam Rumanek.</itunes:summary>
      <itunes:subtitle>Online Content - how to protect and secure your digital rights

In today's world of content creation, sharing, posting and blogging, it is more important than ever to be able to protect and control your online content.  Whether you are a musician, artist,</itunes:subtitle>
      <itunes:keywords>online content management, digital rights management, control of digital rights, control of online content, security of online content</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 33: Age Check Certification Scheme - what technology companies need to know</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>33</itunes:episode>
      <podcast:episode>33</podcast:episode>
      <itunes:title>Episode 33: Age Check Certification Scheme - what technology companies need to know</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ce4d9ae0-7cfd-4cde-8a58-1ff780200d58</guid>
      <link>https://share.transistor.fm/s/2410a664</link>
      <description>
        <![CDATA[<p>In this episode, we talk about the first officially approved certification schemes under Art.42 of UK GDPR by the ICO: the Data Protection and Privacy for ID &amp; Age Assurance Services, and the Age Appropriate Design Certification.</p>

<p>Our special guest, Tony Allen CEO of The Age Check Certification Scheme (ACCS) talks about the scope and applicability of the certification schemes and what technology companies need to consider.  Tony also explains more about the ACCS which is a UKAS-accredited conformity assessment body, comprised of auditors, certification specialists, and data protection experts and how they independently test and certify online and offline systems that check age and identity, such as passport scanners, biometric technology, and age verification software. </p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong></p>

<p><strong>Guest</strong><br>
Tony Allen<br>
CEO of The Age Check Certification Scheme</p>

<p>Contact Tony Allen on:<br>
Email:  <a href="mailto:tony.allen@accscheme.com" rel="nofollow">tony.allen@accscheme.com</a><br>
Twitter:  @agecheckcert<br>
Linkedin: Tony Allen | LinkedIn</p><p>Special Guest: Tony Allen.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we talk about the first officially approved certification schemes under Art.42 of UK GDPR by the ICO: the Data Protection and Privacy for ID &amp; Age Assurance Services, and the Age Appropriate Design Certification.</p>

<p>Our special guest, Tony Allen CEO of The Age Check Certification Scheme (ACCS) talks about the scope and applicability of the certification schemes and what technology companies need to consider.  Tony also explains more about the ACCS which is a UKAS-accredited conformity assessment body, comprised of auditors, certification specialists, and data protection experts and how they independently test and certify online and offline systems that check age and identity, such as passport scanners, biometric technology, and age verification software. </p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong></p>

<p><strong>Guest</strong><br>
Tony Allen<br>
CEO of The Age Check Certification Scheme</p>

<p>Contact Tony Allen on:<br>
Email:  <a href="mailto:tony.allen@accscheme.com" rel="nofollow">tony.allen@accscheme.com</a><br>
Twitter:  @agecheckcert<br>
Linkedin: Tony Allen | LinkedIn</p><p>Special Guest: Tony Allen.</p>]]>
      </content:encoded>
      <pubDate>Wed, 19 Jan 2022 09:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/2410a664/2976e0c6.mp3" length="44061849" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/YiTCh2boH2vM29lSPULbnowr8BjEjVQC1ZYP3edvU7k/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQzMTAv/MTY3MzQ1MjI1NC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1828</itunes:duration>
      <itunes:summary>In this episode, we talk about the first officially approved certification schemes under Art.42 of UK GDPR by the ICO: the Data Protection and Privacy for ID &amp;amp; Age Assurance Services, and the Age Appropriate Design Certification.

Our special guest, Tony Allen CEO of The Age Check Certification Scheme (ACCS) talks about the scope and applicability of the certification schemes and what technology companies need to consider.  Tony also explains more about the ACCS which is a UKAS-accredited conformity assessment body, comprised of auditors, certification specialists, and data protection experts and how they independently test and certify online and offline systems that check age and identity, such as passport scanners, biometric technology, and age verification software. 

GDPR Now! Is brought to you by Data Protection 4 Business &amp;amp; This Is DPO.
www.dpo4business.co.uk
www.thisisdpo.co.uk

Guest
Tony Allen
CEO of The Age Check Certification Scheme

Contact Tony Allen on:
Email:  tony.allen@accscheme.com
Twitter:  @agecheckcert
Linkedin: Tony Allen | LinkedInSpecial Guest: Tony Allen.</itunes:summary>
      <itunes:subtitle>In this episode, we talk about the first officially approved certification schemes under Art.42 of UK GDPR by the ICO: the Data Protection and Privacy for ID &amp;amp; Age Assurance Services, and the Age Appropriate Design Certification.

Our special guest, T</itunes:subtitle>
      <itunes:keywords>age appropriate design, data privacy, ICO, technology, ISS, Age assurance</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 34: Making AI Regulation Strategic for businesses</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>34</itunes:episode>
      <podcast:episode>34</podcast:episode>
      <itunes:title>Episode 34: Making AI Regulation Strategic for businesses</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">71eab817-4714-4e04-8b46-d500aef58956</guid>
      <link>https://share.transistor.fm/s/db5f159c</link>
      <description>
        <![CDATA[<p>In this episode, we talk about Making AI Regulation Strategic for businesses and discuss what businesses can do to keep abreast of regulations, compliance solutions and protect their developments in AI.</p>

<p>Our special guest is Ayisha Piotti, Co-Founder &amp; Managing Partner of RegHorizons, a business decidated to helping build trust in emerging technologies through promoting policy solutions and by facilitating dialogue be-tween governments, academia, businesses and civil society.</p>

<p>To learn about the work that RegHorizon do, check out this link to their latest AI Policy event  <a href="https://reghorizon.com/events/" rel="nofollow">https://reghorizon.com/events/</a></p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong></p>

<p><strong>Guest</strong><br>
Ayisha Piotti</p>

<p>Contact Ayisha Piotti on:<br>
Email:  <a href="mailto:Ayisha.piotti@reghorizon.com" rel="nofollow">Ayisha.piotti@reghorizon.com</a><br>
Twitter:  @PiottiAyisha</p><p>Special Guest: Ayisha Piotti.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we talk about Making AI Regulation Strategic for businesses and discuss what businesses can do to keep abreast of regulations, compliance solutions and protect their developments in AI.</p>

<p>Our special guest is Ayisha Piotti, Co-Founder &amp; Managing Partner of RegHorizons, a business decidated to helping build trust in emerging technologies through promoting policy solutions and by facilitating dialogue be-tween governments, academia, businesses and civil society.</p>

<p>To learn about the work that RegHorizon do, check out this link to their latest AI Policy event  <a href="https://reghorizon.com/events/" rel="nofollow">https://reghorizon.com/events/</a></p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong></p>

<p><strong>Guest</strong><br>
Ayisha Piotti</p>

<p>Contact Ayisha Piotti on:<br>
Email:  <a href="mailto:Ayisha.piotti@reghorizon.com" rel="nofollow">Ayisha.piotti@reghorizon.com</a><br>
Twitter:  @PiottiAyisha</p><p>Special Guest: Ayisha Piotti.</p>]]>
      </content:encoded>
      <pubDate>Mon, 15 Nov 2021 14:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/db5f159c/96801403.mp3" length="65949546" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/wulzP6nFrizgBu8cH960UCyhCi6KviuSNa85TA6ol90/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQzMDkv/MTY3MzQ1MjI1Ni1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2740</itunes:duration>
      <itunes:summary>In this episode, we talk about Making AI Regulation Strategic for businesses and discuss what businesses can do to keep abreast of regulations, compliance solutions and protect their developments in AI.

Our special guest is Ayisha Piotti, Co-Founder &amp;amp; Managing Partner of RegHorizons, a business decidated to helping build trust in emerging technologies through promoting policy solutions and by facilitating dialogue be-tween governments, academia, businesses and civil society.

To learn about the work that RegHorizon do, check out this link to their latest AI Policy event  https://reghorizon.com/events/

GDPR Now! Is brought to you by Data Protection 4 Business.
www.dpo4business.co.uk

Guest
Ayisha Piotti

Contact Ayisha Piotti on:
Email:  Ayisha.piotti@reghorizon.com
Twitter:  @PiottiAyishaSpecial Guest: Ayisha Piotti.</itunes:summary>
      <itunes:subtitle>In this episode, we talk about Making AI Regulation Strategic for businesses and discuss what businesses can do to keep abreast of regulations, compliance solutions and protect their developments in AI.

Our special guest is Ayisha Piotti, Co-Founder &amp;amp</itunes:subtitle>
      <itunes:keywords>gdpr, data privacy, artificial intelligence, machine learning, data security, technology, data protection</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 32: Decentralised Identity - digital ID solutions for our future</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>32</itunes:episode>
      <podcast:episode>32</podcast:episode>
      <itunes:title>Episode 32: Decentralised Identity - digital ID solutions for our future</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fd7909d0-3024-4f73-9dd3-c614c7138dd6</guid>
      <link>https://share.transistor.fm/s/e5e1f680</link>
      <description>
        <![CDATA[<p>In this episode, we continue our discussions about the digital ID solution of decentralised identity, and how more and more organisations are starting to take notice of of this technology as a means to verify the identity of people in a secure, efficient, cost effective and privacy enhancing way. </p>

<p>Our special guests, Khalid Maliki and Jimmy Snoek talk about  decentralised identity, also known as Self Sovereign Identity (SSI), how it can be implemented, the benefits and in particular, how they created the awarding winning digital ID company Tykn. We talk about the growth of SSI and how they believe it will positively impact billions of peoples lives.</p>

<p>As we enter what is arguably, the start of our journey into a new era of digital innovation with huge benefits to individuals and businesses, we are excited to follow developments around the growth of digitial ID solutions such as decentralised identity. </p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong></p>

<p><strong>Guest</strong><br>
Khalid Maliki &amp; Jimmy Snoek<br>
Co-Founders of Tykn</p>

<p>Contact Khalid on:<br>
Email:  <a href="mailto:khalid@tykn.tech" rel="nofollow">khalid@tykn.tech</a><br>
Twitter:  @Khalidworks</p>

<p>Contact Jimmy on:<br>
Email:  <a href="mailto:jimmy@tykn.tech" rel="nofollow">jimmy@tykn.tech</a><br>
Twitter:  @idforgood</p>

<p>Website: <a href="https://tykn.tech/" rel="nofollow">https://tykn.tech/</a></p><p>Special Guests: Jimmy Snoek and Khalid Maliki.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we continue our discussions about the digital ID solution of decentralised identity, and how more and more organisations are starting to take notice of of this technology as a means to verify the identity of people in a secure, efficient, cost effective and privacy enhancing way. </p>

<p>Our special guests, Khalid Maliki and Jimmy Snoek talk about  decentralised identity, also known as Self Sovereign Identity (SSI), how it can be implemented, the benefits and in particular, how they created the awarding winning digital ID company Tykn. We talk about the growth of SSI and how they believe it will positively impact billions of peoples lives.</p>

<p>As we enter what is arguably, the start of our journey into a new era of digital innovation with huge benefits to individuals and businesses, we are excited to follow developments around the growth of digitial ID solutions such as decentralised identity. </p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong></p>

<p><strong>Guest</strong><br>
Khalid Maliki &amp; Jimmy Snoek<br>
Co-Founders of Tykn</p>

<p>Contact Khalid on:<br>
Email:  <a href="mailto:khalid@tykn.tech" rel="nofollow">khalid@tykn.tech</a><br>
Twitter:  @Khalidworks</p>

<p>Contact Jimmy on:<br>
Email:  <a href="mailto:jimmy@tykn.tech" rel="nofollow">jimmy@tykn.tech</a><br>
Twitter:  @idforgood</p>

<p>Website: <a href="https://tykn.tech/" rel="nofollow">https://tykn.tech/</a></p><p>Special Guests: Jimmy Snoek and Khalid Maliki.</p>]]>
      </content:encoded>
      <pubDate>Thu, 07 Oct 2021 08:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/e5e1f680/68699ac4.mp3" length="71193686" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/5ZtcUgWgeg6_tdSpOVJSLj7z4hzY03eH3xpjep6bkg4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQzMDgv/MTY3MzQ1MjI1NC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2219</itunes:duration>
      <itunes:summary>In this episode, we continue our discussions about the digital ID solution of decentralised identity, and how more and more organisations are starting to take notice of of this technology as a means to verify the identity of people in a secure, efficient, cost effective and privacy enhancing way. 

Our special guests, Khalid Maliki and Jimmy Snoek talk about  decentralised identity, also known as Self Sovereign Identity (SSI), how it can be implemented, the benefits and in particular, how they created the awarding winning digital ID company Tykn. We talk about the growth of SSI and how they believe it will positively impact billions of peoples lives.

As we enter what is arguably, the start of our journey into a new era of digital innovation with huge benefits to individuals and businesses, we are excited to follow developments around the growth of digitial ID solutions such as decentralised identity. 

GDPR Now! Is brought to you by Data Protection 4 Business
www.dpo4business.co.uk

Guest
Khalid Maliki &amp;amp; Jimmy Snoek
Co-Founders of Tykn

Contact Khalid on:
Email:  khalid@tykn.tech
Twitter:  @Khalidworks

Contact Jimmy on:
Email:  jimmy@tykn.tech
Twitter:  @idforgood

Website: https://tykn.tech/Special Guests: Jimmy Snoek and Khalid Maliki.</itunes:summary>
      <itunes:subtitle>In this episode, we continue our discussions about the digital ID solution of decentralised identity, and how more and more organisations are starting to take notice of of this technology as a means to verify the identity of people in a secure, efficient,</itunes:subtitle>
      <itunes:keywords>decentralised identity, privacy enhancing, emerging technology, distributed ledgers, blockchain, data protection</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 31: Challenging the Privacy narrative</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>31</itunes:episode>
      <podcast:episode>31</podcast:episode>
      <itunes:title>Episode 31: Challenging the Privacy narrative</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8e867a58-14d9-49ba-9b6e-fca15cbf109c</guid>
      <link>https://share.transistor.fm/s/f0507fd8</link>
      <description>
        <![CDATA[<p>In this episode, we discuss, controversially, why data privacy, including regulations like GDPR, are counterproductive and why we would all be better off without the current notion of data privacy. </p>

<p>Our special guest, Ben Malisow, is our 'privacy provocateur' on our show and talks about why he believes we are living an 'illusion of privacy'.  </p>

<p>Ben has over 30 years experience in information security and education and is currently a professional certification training lead for SGS Cybersecurity Services,  a multinational corporation involved in a wide range of product and process certification/validation.</p>

<p>Some of Ben’s roles have also included professor of English, a computer teacher for troubled teens as well as his extensive experience working with clients such as FedEx, US Special Forces Command, the United Nations, HSBC, and Barclays.</p>

<p>Ben is the author of  ''Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity.'' </p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong></p>

<p><strong>Guest</strong><br>
Ben Malisow<br>
Professional Certification Training Lead for SGS<br>
Website: <a href="https://www.securityzed.com/" rel="nofollow">https://www.securityzed.com/</a><br>
Twitter: <a href="https://twitter.com/BenMalisow" rel="nofollow">https://twitter.com/BenMalisow</a><br>
LinkedIn: <a href="https://www.linkedin.com/in/malisow" rel="nofollow">https://www.linkedin.com/in/malisow</a></p><p>Special Guest: Ben Malisow.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we discuss, controversially, why data privacy, including regulations like GDPR, are counterproductive and why we would all be better off without the current notion of data privacy. </p>

<p>Our special guest, Ben Malisow, is our 'privacy provocateur' on our show and talks about why he believes we are living an 'illusion of privacy'.  </p>

<p>Ben has over 30 years experience in information security and education and is currently a professional certification training lead for SGS Cybersecurity Services,  a multinational corporation involved in a wide range of product and process certification/validation.</p>

<p>Some of Ben’s roles have also included professor of English, a computer teacher for troubled teens as well as his extensive experience working with clients such as FedEx, US Special Forces Command, the United Nations, HSBC, and Barclays.</p>

<p>Ben is the author of  ''Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity.'' </p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong></p>

<p><strong>Guest</strong><br>
Ben Malisow<br>
Professional Certification Training Lead for SGS<br>
Website: <a href="https://www.securityzed.com/" rel="nofollow">https://www.securityzed.com/</a><br>
Twitter: <a href="https://twitter.com/BenMalisow" rel="nofollow">https://twitter.com/BenMalisow</a><br>
LinkedIn: <a href="https://www.linkedin.com/in/malisow" rel="nofollow">https://www.linkedin.com/in/malisow</a></p><p>Special Guest: Ben Malisow.</p>]]>
      </content:encoded>
      <pubDate>Wed, 08 Sep 2021 12:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/f0507fd8/ed40906d.mp3" length="59304392" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/a0l-GCsI48baCKKxYZ7M5-0QiHi0NgxOgbfF8EwSyNk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQzMDcv/MTY3MzQ1MjI1MS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2463</itunes:duration>
      <itunes:summary>In this episode, we discuss, controversially, why data privacy, including regulations like GDPR, are counterproductive and why we would all be better off without the current notion of data privacy. 

Our special guest, Ben Malisow, is our 'privacy provocateur' on our show and talks about why he believes we are living an 'illusion of privacy'.  

Ben has over 30 years experience in information security and education and is currently a professional certification training lead for SGS Cybersecurity Services,  a multinational corporation involved in a wide range of product and process certification/validation.

Some of Ben’s roles have also included professor of English, a computer teacher for troubled teens as well as his extensive experience working with clients such as FedEx, US Special Forces Command, the United Nations, HSBC, and Barclays.

Ben is the author of  ''Exposed: How Revealing Your Data and Eliminating Privacy Increases Trust and Liberates Humanity.'' 

GDPR Now! Is brought to you by Data Protection 4 Business.
www.dpo4business.co.uk

Guest
Ben Malisow
Professional Certification Training Lead for SGS
Website: https://www.securityzed.com/
Twitter: https://twitter.com/BenMalisow
LinkedIn: https://www.linkedin.com/in/malisowSpecial Guest: Ben Malisow.</itunes:summary>
      <itunes:subtitle>In this episode, we discuss, controversially, why data privacy, including regulations like GDPR, are counterproductive and why we would all be better off without the current notion of data privacy. 

Our special guest, Ben Malisow, is our 'privacy provoca</itunes:subtitle>
      <itunes:keywords>gdpr, data privacy, data security, technology, data protection</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 30: The Future:  Proving your Identity</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>30</itunes:episode>
      <podcast:episode>30</podcast:episode>
      <itunes:title>Episode 30: The Future:  Proving your Identity</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">122c3570-f7b8-4da7-855a-253d985d800a</guid>
      <link>https://share.transistor.fm/s/8a1dee38</link>
      <description>
        <![CDATA[<p>In this episode, we talk about the future of credential management – Self Sovereign Identity (SSI) also known as decentralised identity.  SSI is an efficient, secure and privacy enhancing solution for identity verification.  It puts individuals at the centre of the verification process and is the future of identity management.</p>

<p>Our special guest, James Monaghan, talks about how Evernym provides solutions in the area of SSI for businesses today.  We talk about what SSI means, how it works, the benefits for individuals and businesses and importantly, examples of how it is being used to great effect today.</p>

<p>For any businesses interested in learning more about how they could benefit from building an SSI or decentralised identity solution, please contact James directly.</p>

<p>As we enter what is arguably, the start of our journey into a new era of digital innovation with huge benefits to individuals and businesses, we are excited to follow developments around the growth of Self Soverign Identity.</p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong></p>

<p><strong>Guest</strong><br>
James Monaghan<br>
Vice President of Product Management at Evernym.</p>

<p>Contact James on:<br>
Email:  <a href="mailto:james.monaghan@evernym.com" rel="nofollow">james.monaghan@evernym.com</a><br>
Twitter:  @james_monaghan<br>
<a href="https://www.linkedin.com/in/jamesmonaghan/" rel="nofollow">https://www.linkedin.com/in/jamesmonaghan/</a></p>

<p>World Web Consortium (W3C) specifications for existing SSI solutions:</p>

<ul>
<li>Decentralised Identifiers <a href="https://www.w3.org/TR/did-core/" rel="nofollow">https://www.w3.org/TR/did-core/</a></li>
<li>Verifiable Credentials <a href="https://www.w3.org/TR/vc-data-model/" rel="nofollow">https://www.w3.org/TR/vc-data-model/</a></li>
<li>Simple explainer about how this all works <a href="https://www.evernym.com/blog/gentle-introduction-verifiable-credentials/" rel="nofollow">https://www.evernym.com/blog/gentle-introduction-verifiable-credentials/</a></li>
</ul>

<p>Relevant industry bodies include:</p>

<ul>
<li>The Decentralised Identity Foundation <a href="https://identity.foundation/" rel="nofollow">https://identity.foundation/</a></li>
<li>Trust over IP Foundation <a href="https://trustoverip.org/" rel="nofollow">https://trustoverip.org/</a></li>
<li>Good Health Pass Collaborative <a href="https://www.goodhealthpass.org/" rel="nofollow">https://www.goodhealthpass.org/</a></li>
</ul><p>Special Guest: James Monaghan.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we talk about the future of credential management – Self Sovereign Identity (SSI) also known as decentralised identity.  SSI is an efficient, secure and privacy enhancing solution for identity verification.  It puts individuals at the centre of the verification process and is the future of identity management.</p>

<p>Our special guest, James Monaghan, talks about how Evernym provides solutions in the area of SSI for businesses today.  We talk about what SSI means, how it works, the benefits for individuals and businesses and importantly, examples of how it is being used to great effect today.</p>

<p>For any businesses interested in learning more about how they could benefit from building an SSI or decentralised identity solution, please contact James directly.</p>

<p>As we enter what is arguably, the start of our journey into a new era of digital innovation with huge benefits to individuals and businesses, we are excited to follow developments around the growth of Self Soverign Identity.</p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong></p>

<p><strong>Guest</strong><br>
James Monaghan<br>
Vice President of Product Management at Evernym.</p>

<p>Contact James on:<br>
Email:  <a href="mailto:james.monaghan@evernym.com" rel="nofollow">james.monaghan@evernym.com</a><br>
Twitter:  @james_monaghan<br>
<a href="https://www.linkedin.com/in/jamesmonaghan/" rel="nofollow">https://www.linkedin.com/in/jamesmonaghan/</a></p>

<p>World Web Consortium (W3C) specifications for existing SSI solutions:</p>

<ul>
<li>Decentralised Identifiers <a href="https://www.w3.org/TR/did-core/" rel="nofollow">https://www.w3.org/TR/did-core/</a></li>
<li>Verifiable Credentials <a href="https://www.w3.org/TR/vc-data-model/" rel="nofollow">https://www.w3.org/TR/vc-data-model/</a></li>
<li>Simple explainer about how this all works <a href="https://www.evernym.com/blog/gentle-introduction-verifiable-credentials/" rel="nofollow">https://www.evernym.com/blog/gentle-introduction-verifiable-credentials/</a></li>
</ul>

<p>Relevant industry bodies include:</p>

<ul>
<li>The Decentralised Identity Foundation <a href="https://identity.foundation/" rel="nofollow">https://identity.foundation/</a></li>
<li>Trust over IP Foundation <a href="https://trustoverip.org/" rel="nofollow">https://trustoverip.org/</a></li>
<li>Good Health Pass Collaborative <a href="https://www.goodhealthpass.org/" rel="nofollow">https://www.goodhealthpass.org/</a></li>
</ul><p>Special Guest: James Monaghan.</p>]]>
      </content:encoded>
      <pubDate>Thu, 08 Jul 2021 13:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/8a1dee38/0acffad2.mp3" length="60857028" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/MVBqlwrpzWdRc17jiMrRH-_uj1I6jJkdHeHlcIZLXv0/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQzMDYv/MTY3MzQ1MjI0NS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2528</itunes:duration>
      <itunes:summary>In this episode, we talk about the future of credential management – Self Sovereign Identity (SSI) also known as decentralised identity.  SSI is an efficient, secure and privacy enhancing solution for identity verification.  It puts individuals at the centre of the verification process and is the future of identity management.

Our special guest, James Monaghan, talks about how Evernym provides solutions in the area of SSI for businesses today.  We talk about what SSI means, how it works, the benefits for individuals and businesses and importantly, examples of how it is being used to great effect today.

For any businesses interested in learning more about how they could benefit from building an SSI or decentralised identity solution, please contact James directly.

As we enter what is arguably, the start of our journey into a new era of digital innovation with huge benefits to individuals and businesses, we are excited to follow developments around the growth of Self Soverign Identity.

GDPR Now! Is brought to you by Data Protection 4 Business &amp;amp; This Is DPO.
www.dpo4business.co.uk
www.thisisdpo.co.uk

Guest
James Monaghan
Vice President of Product Management at Evernym.

Contact James on:
Email:  james.monaghan@evernym.com
Twitter:  @james_monaghan
https://www.linkedin.com/in/jamesmonaghan/

World Web Consortium (W3C) specifications for existing SSI solutions:


Decentralised Identifiers https://www.w3.org/TR/did-core/
Verifiable Credentials https://www.w3.org/TR/vc-data-model/
Simple explainer about how this all works https://www.evernym.com/blog/gentle-introduction-verifiable-credentials/


Relevant industry bodies include:


The Decentralised Identity Foundation https://identity.foundation/
Trust over IP Foundation https://trustoverip.org/
Good Health Pass Collaborative https://www.goodhealthpass.org/
Special Guest: James Monaghan.</itunes:summary>
      <itunes:subtitle>In this episode, we talk about the future of credential management – Self Sovereign Identity (SSI) also known as decentralised identity.  SSI is an efficient, secure and privacy enhancing solution for identity verification.  It puts individuals at the cen</itunes:subtitle>
      <itunes:keywords>identity management, data privacy, data security, digital innovation, technology, self sovereign identity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 29: Regulating the future of AI and ML</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>29</itunes:episode>
      <podcast:episode>29</podcast:episode>
      <itunes:title>Episode 29: Regulating the future of AI and ML</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">130455f2-e5bd-4bd6-af2e-0a02fed5eeac</guid>
      <link>https://share.transistor.fm/s/18a9cc9e</link>
      <description>
        <![CDATA[<p>In this episode, we are going to talk about the regulation of Artificial Intelligence and Machine Learning to understand what businesses need to think about from a regulatory perspective. </p>

<p>Our special guest, Ben, talks about the global context of regulations around AI and the complexity of the parallel 'race to AI' and 'race to regulation' .  In particular we look at the proposed Artificial Intelligence Act from the European Union and consider the impact on innovation.</p>

<p>We explore what businesses and DPOs need to consider when building, using or deploying Machine learning or Artificial Intelligence systems.</p>

<p>As we enter what is arguably, the start of our journey into a new era of innovation with huge benefits to humankind, this podcast will follow developments in and around the regulation of future Artificial Intelligence and Machine Learning.</p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong></p>

<p><strong>Guest</strong><br>
Benjamin Mueller<br>
Ben is a senior policy analyst at the Center for Data Innovation, focusing on AI and technology governance. </p>

<p>Read Ben's note on:  AI Act Explainer is here: <a href="https://datainnovation.org/2021/05/the-artificial-intelligence-act-a-quick-explainer/" rel="nofollow">https://datainnovation.org/2021/05/the-artificial-intelligence-act-a-quick-explainer/</a></p><p>Special Guest: Benjamin Mueller.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In this episode, we are going to talk about the regulation of Artificial Intelligence and Machine Learning to understand what businesses need to think about from a regulatory perspective. </p>

<p>Our special guest, Ben, talks about the global context of regulations around AI and the complexity of the parallel 'race to AI' and 'race to regulation' .  In particular we look at the proposed Artificial Intelligence Act from the European Union and consider the impact on innovation.</p>

<p>We explore what businesses and DPOs need to consider when building, using or deploying Machine learning or Artificial Intelligence systems.</p>

<p>As we enter what is arguably, the start of our journey into a new era of innovation with huge benefits to humankind, this podcast will follow developments in and around the regulation of future Artificial Intelligence and Machine Learning.</p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong></p>

<p><strong>Guest</strong><br>
Benjamin Mueller<br>
Ben is a senior policy analyst at the Center for Data Innovation, focusing on AI and technology governance. </p>

<p>Read Ben's note on:  AI Act Explainer is here: <a href="https://datainnovation.org/2021/05/the-artificial-intelligence-act-a-quick-explainer/" rel="nofollow">https://datainnovation.org/2021/05/the-artificial-intelligence-act-a-quick-explainer/</a></p><p>Special Guest: Benjamin Mueller.</p>]]>
      </content:encoded>
      <pubDate>Thu, 03 Jun 2021 09:15:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/18a9cc9e/752bcc79.mp3" length="59924365" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/fSx0mCmsXNojY6dc3iZnrJp-S2NxdWx4G8KVxFlksBE/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQzMDUv/MTY3MzQ1MjI0Mi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2489</itunes:duration>
      <itunes:summary>In this episode, we are going to talk about the regulation of Artificial Intelligence and Machine Learning to understand what businesses need to think about from a regulatory perspective. 

Our special guest, Ben, talks about the global context of regulations around AI and the complexity of the parallel 'race to AI' and 'race to regulation' .  In particular we look at the proposed Artificial Intelligence Act from the European Union and consider the impact on innovation.

We explore what businesses and DPOs need to consider when building, using or deploying Machine learning or Artificial Intelligence systems.

As we enter what is arguably, the start of our journey into a new era of innovation with huge benefits to humankind, this podcast will follow developments in and around the regulation of future Artificial Intelligence and Machine Learning.

GDPR Now! Is brought to you by Data Protection 4 Business &amp;amp; This Is DPO.
www.dpo4business.co.uk
www.thisisdpo.co.uk

Guest
Benjamin Mueller
Ben is a senior policy analyst at the Center for Data Innovation, focusing on AI and technology governance. 

Read Ben's note on:  AI Act Explainer is here: https://datainnovation.org/2021/05/the-artificial-intelligence-act-a-quick-explainer/Special Guest: Benjamin Mueller.</itunes:summary>
      <itunes:subtitle>In this episode, we are going to talk about the regulation of Artificial Intelligence and Machine Learning to understand what businesses need to think about from a regulatory perspective. 

Our special guest, Ben, talks about the global context of regulat</itunes:subtitle>
      <itunes:keywords>gdpr, artificial intelligence, machine learning, regulations, intelligent automation, data protection</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 28: Digital Vaccine Passports and Certificates? What could possibly go wrong?</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>28</itunes:episode>
      <podcast:episode>28</podcast:episode>
      <itunes:title>Episode 28: Digital Vaccine Passports and Certificates? What could possibly go wrong?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">a61eb0f7-7cdf-4f71-938a-ed9488bd3150</guid>
      <link>https://share.transistor.fm/s/35b42d22</link>
      <description>
        <![CDATA[<p>In today’s episode, we are delving into the hot topic of Digital Vaccine Passports and Certificates.  We outline the complex mix of technology, privacy and practical issues in a global context.   </p>

<p>As we did in Episodes 24 &amp; 25, we look at the significant practical, technical and privacy issues surrounding how nation states and governments want to use technology to prove human beings can travel internationally, cross borders in the EU and get access to domestic venues, events, retail outlets and much more besides.  Arguably a more complex problem to solve than tracking and tracing individuals. </p>

<p>We consider the lack of effectiveness of the Track and Trace apps in the UK &amp; EU and wonder how acceptable solutions can be found for Vaccine Passports and Certificates - a wider problem involving citizens, businesses, medical records and often new and emerging technology.   </p>

<p>Again, we find ourselves asking the same question: how do we find a rapid and effective way to discuss and agree the extended use of our data to manage this pandemic and halt the damage from lockdowns?  We urgently need a forum to be able to have these discussions.   As Privacy, Legal and Techology professionals we must contribute to solutions to help support governments to enable better pandemic management.</p>

<p>There are far more questions than answers, so this episode will be the start of our journey to keep up to date with developments.</p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong>.</p>

<p><strong>Guests</strong><br>
Roger Marlow<br>
Roger has worked in software for over 30 years with experience in building software for the finance, retail, automative and government sectors. He has been involved in the creation of several companies including a healthcare technology company that works for the NHS.</p><p>Special Guest: Roger Marlow.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In today’s episode, we are delving into the hot topic of Digital Vaccine Passports and Certificates.  We outline the complex mix of technology, privacy and practical issues in a global context.   </p>

<p>As we did in Episodes 24 &amp; 25, we look at the significant practical, technical and privacy issues surrounding how nation states and governments want to use technology to prove human beings can travel internationally, cross borders in the EU and get access to domestic venues, events, retail outlets and much more besides.  Arguably a more complex problem to solve than tracking and tracing individuals. </p>

<p>We consider the lack of effectiveness of the Track and Trace apps in the UK &amp; EU and wonder how acceptable solutions can be found for Vaccine Passports and Certificates - a wider problem involving citizens, businesses, medical records and often new and emerging technology.   </p>

<p>Again, we find ourselves asking the same question: how do we find a rapid and effective way to discuss and agree the extended use of our data to manage this pandemic and halt the damage from lockdowns?  We urgently need a forum to be able to have these discussions.   As Privacy, Legal and Techology professionals we must contribute to solutions to help support governments to enable better pandemic management.</p>

<p>There are far more questions than answers, so this episode will be the start of our journey to keep up to date with developments.</p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong>.</p>

<p><strong>Guests</strong><br>
Roger Marlow<br>
Roger has worked in software for over 30 years with experience in building software for the finance, retail, automative and government sectors. He has been involved in the creation of several companies including a healthcare technology company that works for the NHS.</p><p>Special Guest: Roger Marlow.</p>]]>
      </content:encoded>
      <pubDate>Thu, 15 Apr 2021 11:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/35b42d22/cf9c530d.mp3" length="45568884" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/RXroM1ENtFDoxwV03txgbxh5z4MXONicTaMrLuxIZrw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQzMDQv/MTY3MzQ1MjIzOS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2836</itunes:duration>
      <itunes:summary>In today’s episode, we are delving into the hot topic of Digital Vaccine Passports and Certificates.  We outline the complex mix of technology, privacy and practical issues in a global context.   

As we did in Episodes 24 &amp;amp; 25, we look at the significant practical, technical and privacy issues surrounding how nation states and governments want to use technology to prove human beings can travel internationally, cross borders in the EU and get access to domestic venues, events, retail outlets and much more besides.  Arguably a more complex problem to solve than tracking and tracing individuals. 

We consider the lack of effectiveness of the Track and Trace apps in the UK &amp;amp; EU and wonder how acceptable solutions can be found for Vaccine Passports and Certificates - a wider problem involving citizens, businesses, medical records and often new and emerging technology.   

Again, we find ourselves asking the same question: how do we find a rapid and effective way to discuss and agree the extended use of our data to manage this pandemic and halt the damage from lockdowns?  We urgently need a forum to be able to have these discussions.   As Privacy, Legal and Techology professionals we must contribute to solutions to help support governments to enable better pandemic management.

There are far more questions than answers, so this episode will be the start of our journey to keep up to date with developments.

GDPR Now! Is brought to you by Data Protection 4 Business &amp;amp; This Is DPO.
www.dpo4business.co.uk
www.thisisdpo.co.uk.

Guests
Roger Marlow
Roger has worked in software for over 30 years with experience in building software for the finance, retail, automative and government sectors. He has been involved in the creation of several companies including a healthcare technology company that works for the NHS.Special Guest: Roger Marlow.</itunes:summary>
      <itunes:subtitle>In today’s episode, we are delving into the hot topic of Digital Vaccine Passports and Certificates.  We outline the complex mix of technology, privacy and practical issues in a global context.   

As we did in Episodes 24 &amp;amp; 25, we look at the signifi</itunes:subtitle>
      <itunes:keywords>digital vaccine passports, data privacy, data security, technology, data protection, covid19</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 26: What next for EU-US data transfers post-Privacy Shield?  Keep hiding in that herd!</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>26</itunes:episode>
      <podcast:episode>26</podcast:episode>
      <itunes:title>Episode 26: What next for EU-US data transfers post-Privacy Shield?  Keep hiding in that herd!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cb6343bb-5b8e-49fa-adc3-1c3a06be362e</guid>
      <link>https://share.transistor.fm/s/e8f6b686</link>
      <description>
        <![CDATA[<p>The decision by the ECJ on 16th July 2020, to invalidate the EU - US Privacy Shield sent shockwaves across organisations in the EU and US.  We are now in January 2021 and there have been some solutions offered by the European Commission.  </p>

<p>But how workable are they for businesses in practise??</p>

<p>Join me, Karen Heaton and guest Mark Sherwood-Edwards, lawyer, data protection specialist and founder of Clearview Legal to discuss the latest pronouncements from the EC, on a revision of the Standard Contractual Clauses, Safeguards for transfers to the US (and other third countries) and of course, the impact of Brexit and what this will mean if the EC does not grant adequacy status to the UK. </p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong>.</p>

<p><strong>Guest</strong><br>
Mark Sherwood-Edwards<br>
Founder <br>
<a href="http://www.clearviewlegal.co.uk" rel="nofollow">www.clearviewlegal.co.uk</a></p>

<p>Check out some great resources:<br>
FieldFisher Lawyer - Phil Lee on the revised SCCs<br>
<a href="https://www.fieldfisher.com/en/services/privacy-security-and-information/privacy-security-and-information-law-blog/first-impressions-new-eu-standard-contractual-clauses" rel="nofollow">https://www.fieldfisher.com/en/services/privacy-security-and-information/privacy-security-and-information-law-blog/first-impressions-new-eu-standard-contractual-clauses</a></p>

<p>Tools to help with assessing data transfers<br>
Proteus-Cyber<br>
<a href="https://proteuscyber.com/Schrems-II-Automatic-SCC-contracts" rel="nofollow">https://proteuscyber.com/Schrems-II-Automatic-SCC-contracts</a></p><p>Special Guest: Mark Sherwood-Edwards.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>The decision by the ECJ on 16th July 2020, to invalidate the EU - US Privacy Shield sent shockwaves across organisations in the EU and US.  We are now in January 2021 and there have been some solutions offered by the European Commission.  </p>

<p>But how workable are they for businesses in practise??</p>

<p>Join me, Karen Heaton and guest Mark Sherwood-Edwards, lawyer, data protection specialist and founder of Clearview Legal to discuss the latest pronouncements from the EC, on a revision of the Standard Contractual Clauses, Safeguards for transfers to the US (and other third countries) and of course, the impact of Brexit and what this will mean if the EC does not grant adequacy status to the UK. </p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong>.</p>

<p><strong>Guest</strong><br>
Mark Sherwood-Edwards<br>
Founder <br>
<a href="http://www.clearviewlegal.co.uk" rel="nofollow">www.clearviewlegal.co.uk</a></p>

<p>Check out some great resources:<br>
FieldFisher Lawyer - Phil Lee on the revised SCCs<br>
<a href="https://www.fieldfisher.com/en/services/privacy-security-and-information/privacy-security-and-information-law-blog/first-impressions-new-eu-standard-contractual-clauses" rel="nofollow">https://www.fieldfisher.com/en/services/privacy-security-and-information/privacy-security-and-information-law-blog/first-impressions-new-eu-standard-contractual-clauses</a></p>

<p>Tools to help with assessing data transfers<br>
Proteus-Cyber<br>
<a href="https://proteuscyber.com/Schrems-II-Automatic-SCC-contracts" rel="nofollow">https://proteuscyber.com/Schrems-II-Automatic-SCC-contracts</a></p><p>Special Guest: Mark Sherwood-Edwards.</p>]]>
      </content:encoded>
      <pubDate>Fri, 29 Jan 2021 11:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/e8f6b686/caf8b78e.mp3" length="55638662" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/5yd4SpceY59wVbGlDeeHlRU4dIJu_zp2bV3WzUtfGkw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQzMDMv/MTY3MzQ1MjI0MC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2311</itunes:duration>
      <itunes:summary>The decision by the ECJ on 16th July 2020, to invalidate the EU - US Privacy Shield sent shockwaves across organisations in the EU and US.  We are now in January 2021 and there have been some solutions offered by the European Commission.  

But how workable are they for businesses in practise??

Join me, Karen Heaton and guest Mark Sherwood-Edwards, lawyer, data protection specialist and founder of Clearview Legal to discuss the latest pronouncements from the EC, on a revision of the Standard Contractual Clauses, Safeguards for transfers to the US (and other third countries) and of course, the impact of Brexit and what this will mean if the EC does not grant adequacy status to the UK. 

GDPR Now! Is brought to you by Data Protection 4 Business &amp;amp; This Is DPO.
www.dpo4business.co.uk
www.thisisdpo.co.uk.

Guest
Mark Sherwood-Edwards
Founder 
www.clearviewlegal.co.uk

Check out some great resources:
FieldFisher Lawyer - Phil Lee on the revised SCCs
https://www.fieldfisher.com/en/services/privacy-security-and-information/privacy-security-and-information-law-blog/first-impressions-new-eu-standard-contractual-clauses

Tools to help with assessing data transfers
Proteus-Cyber
https://proteuscyber.com/Schrems-II-Automatic-SCC-contractsSpecial Guest: Mark Sherwood-Edwards.</itunes:summary>
      <itunes:subtitle>The decision by the ECJ on 16th July 2020, to invalidate the EU - US Privacy Shield sent shockwaves across organisations in the EU and US.  We are now in January 2021 and there have been some solutions offered by the European Commission.  

But how workab</itunes:subtitle>
      <itunes:keywords>gdpr, Privacy shield, ECJ, SCC, BCR, data transfers</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 25: Track and Trace apps: What price for data privacy?  We need to find better solutions.</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>25</itunes:episode>
      <podcast:episode>25</podcast:episode>
      <itunes:title>Episode 25: Track and Trace apps: What price for data privacy?  We need to find better solutions.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">71664337-01e4-483a-9e3b-d4c950c35ae1</guid>
      <link>https://share.transistor.fm/s/ea744172</link>
      <description>
        <![CDATA[<p>In today’s episode, we are delving into the issues we discussed in our previous episode #24 on the NHS Track and Trace app and considering in more detail the legal, privacy and practicality barriers to many track and trace apps in Europe. </p>

<p>We discuss the take up of Track and Trace apps in the EU and find it is mostly 30% of the population and lower.  Data privacy when using apps has been protected due to EU GDPR, however, other basic freedoms have been taken from us and our way of life severely impacted over the course of 2020.  Track and trace apps have not had the hoped-for beneficial impact in the EU.  Had we taken a different approach to using more data and made the apps mandatory, could the outcomes have been different?  </p>

<p>What does this mean in practise for track and trace apps as future solutions to help governments manage pandemics?  Compare and contrast to other Asian countries.</p><p>
If 70 - 80% app usage is realistically needed to be effective, then why did we not make track and trace apps mandatory?  What are we to learn from countries in Asia?</p>

<p>How do we find a rapid and effective way to discuss and agree the extended use of our data to improve outcomes, rapidly, either during pandemics or outside of them?  As Privacy, Legal and Tech professionals we must continue this conversation and find a framework for agreeing the greater use of data in a mandatory way to support better pandemic and health outcomes.   </p>

<p>The economic costs of lockdowns are extremely high and have a direct effect on a nation's ability to provide future healthcare.  Our short term fix to today's problem could cause many more problems for the future.  </p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong>.</p>

<p><strong>Guests</strong><br>
Roger Marlow<br>
Roger has worked in software for over 30 years with experience in building software for the finance, retail, automative and government sectors. He has been involved in the creation of several companies including a healthcare technology company that works for the NHS.</p>

<p><strong>Guests</strong><br>
Mark Sherwood-Edwards<br>
Mark helps CEOs negotiate smarter, more profitable, contracts. During his time spent working in law firms and also as in-house counsel he specialised in contracts as well as sales-contracting  transformation, in organisations across the fintech, adtech, tech and outsourcing sectors.</p>

<p>Founder<br>
Clearview Legal<br>
<a href="https://clearviewlegal.co.uk/" rel="nofollow">https://clearviewlegal.co.uk/</a></p><p>Special Guests: Mark Sherwood-Edwards and Roger Marlow.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In today’s episode, we are delving into the issues we discussed in our previous episode #24 on the NHS Track and Trace app and considering in more detail the legal, privacy and practicality barriers to many track and trace apps in Europe. </p>

<p>We discuss the take up of Track and Trace apps in the EU and find it is mostly 30% of the population and lower.  Data privacy when using apps has been protected due to EU GDPR, however, other basic freedoms have been taken from us and our way of life severely impacted over the course of 2020.  Track and trace apps have not had the hoped-for beneficial impact in the EU.  Had we taken a different approach to using more data and made the apps mandatory, could the outcomes have been different?  </p>

<p>What does this mean in practise for track and trace apps as future solutions to help governments manage pandemics?  Compare and contrast to other Asian countries.</p><p>
If 70 - 80% app usage is realistically needed to be effective, then why did we not make track and trace apps mandatory?  What are we to learn from countries in Asia?</p>

<p>How do we find a rapid and effective way to discuss and agree the extended use of our data to improve outcomes, rapidly, either during pandemics or outside of them?  As Privacy, Legal and Tech professionals we must continue this conversation and find a framework for agreeing the greater use of data in a mandatory way to support better pandemic and health outcomes.   </p>

<p>The economic costs of lockdowns are extremely high and have a direct effect on a nation's ability to provide future healthcare.  Our short term fix to today's problem could cause many more problems for the future.  </p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong>.</p>

<p><strong>Guests</strong><br>
Roger Marlow<br>
Roger has worked in software for over 30 years with experience in building software for the finance, retail, automative and government sectors. He has been involved in the creation of several companies including a healthcare technology company that works for the NHS.</p>

<p><strong>Guests</strong><br>
Mark Sherwood-Edwards<br>
Mark helps CEOs negotiate smarter, more profitable, contracts. During his time spent working in law firms and also as in-house counsel he specialised in contracts as well as sales-contracting  transformation, in organisations across the fintech, adtech, tech and outsourcing sectors.</p>

<p>Founder<br>
Clearview Legal<br>
<a href="https://clearviewlegal.co.uk/" rel="nofollow">https://clearviewlegal.co.uk/</a></p><p>Special Guests: Mark Sherwood-Edwards and Roger Marlow.</p>]]>
      </content:encoded>
      <pubDate>Tue, 01 Dec 2020 09:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/ea744172/8218fff9.mp3" length="89515999" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/5benLp6gxu6vL4lEPZhx_q98NZS5ejlYZne_MX53NwA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQzMDIv/MTY3MzQ1MjIzOS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>3722</itunes:duration>
      <itunes:summary>In today’s episode, we are delving into the issues we discussed in our previous episode #24 on the NHS Track and Trace app and considering in more detail the legal, privacy and practicality barriers to many track and trace apps in Europe. 

We discuss the take up of Track and Trace apps in the EU and find it is mostly 30% of the population and lower.  Data privacy when using apps has been protected due to EU GDPR, however, other basic freedoms have been taken from us and our way of life severely impacted over the course of 2020.  Track and trace apps have not had the hoped-for beneficial impact in the EU.  Had we taken a different approach to using more data and made the apps mandatory, could the outcomes have been different?  

What does this mean in practise for track and trace apps as future solutions to help governments manage pandemics?  Compare and contrast to other Asian countries.
If 70 - 80% app usage is realistically needed to be effective, then why did we not make track and trace apps mandatory?  What are we to learn from countries in Asia?

How do we find a rapid and effective way to discuss and agree the extended use of our data to improve outcomes, rapidly, either during pandemics or outside of them?  As Privacy, Legal and Tech professionals we must continue this conversation and find a framework for agreeing the greater use of data in a mandatory way to support better pandemic and health outcomes.   

The economic costs of lockdowns are extremely high and have a direct effect on a nation's ability to provide future healthcare.  Our short term fix to today's problem could cause many more problems for the future.  

GDPR Now! Is brought to you by Data Protection 4 Business &amp;amp; This Is DPO.
www.dpo4business.co.uk
www.thisisdpo.co.uk.

Guests
Roger Marlow
Roger has worked in software for over 30 years with experience in building software for the finance, retail, automative and government sectors. He has been involved in the creation of several companies including a healthcare technology company that works for the NHS.

Guests
Mark Sherwood-Edwards
Mark helps CEOs negotiate smarter, more profitable, contracts. During his time spent working in law firms and also as in-house counsel he specialised in contracts as well as sales-contracting  transformation, in organisations across the fintech, adtech, tech and outsourcing sectors.

Founder
Clearview Legal
https://clearviewlegal.co.uk/Special Guests: Mark Sherwood-Edwards and Roger Marlow.</itunes:summary>
      <itunes:subtitle>In today’s episode, we are delving into the issues we discussed in our previous episode #24 on the NHS Track and Trace app and considering in more detail the legal, privacy and practicality barriers to many track and trace apps in Europe. 

We discuss the</itunes:subtitle>
      <itunes:keywords>gdpr, privacy, track and trace apps, pandemic, data protection.</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 24: NHS Track and Trace App:  are privacy and practicality issues a barrier to success?</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>24</itunes:episode>
      <podcast:episode>24</podcast:episode>
      <itunes:title>Episode 24: NHS Track and Trace App:  are privacy and practicality issues a barrier to success?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">54bd567d-355c-47f0-bb2d-e786b32e859c</guid>
      <link>https://share.transistor.fm/s/1b42a7b1</link>
      <description>
        <![CDATA[<p>This episode is part of our series of updated podcasts addressing security &amp; privacy concerns resulting from the coronavirus pandemic and the shift in working practises for millions of businesses across the UK and the world. </p>

<p>In our discussion we first talk about the NHS Track and Trace app and ask "how did we get here?" with app #2 being released five months after app #1.</p>

<p>We then explore whether track and trace apps are prevented from being successful due to privacy and practicality issues and whether this is a worldwide problem.    </p>

<p>During our discussion, I recommend a very important film "The Social Dilemma" which is available on Netflix.  This is an must-watch film for everyone, especially parents with teenagers, pre-teens and young adults.</p>

<p>Given some of the important issues raised in this episode, we will be recording Part 2, where we bring in a panel of specialists to start the discussions on how to address the practicality and privacy issues which can prevent track and trace apps from being effective during a pandemic.</p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong>.</p>

<p><strong>Guest</strong><br>
This episode features a software professional with 30 years experience in software projects across a multitude of industries including retail, banking, defence and automotive and for the last 10 years, the NHS.  David founded a successful IT company which provides services to the NHS and writes for <a href="https://lockdownsceptics.org/" rel="nofollow">https://lockdownsceptics.org/</a>  a blog founded by Toby Young, where a range of pandemic related data is analysed and presented.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode is part of our series of updated podcasts addressing security &amp; privacy concerns resulting from the coronavirus pandemic and the shift in working practises for millions of businesses across the UK and the world. </p>

<p>In our discussion we first talk about the NHS Track and Trace app and ask "how did we get here?" with app #2 being released five months after app #1.</p>

<p>We then explore whether track and trace apps are prevented from being successful due to privacy and practicality issues and whether this is a worldwide problem.    </p>

<p>During our discussion, I recommend a very important film "The Social Dilemma" which is available on Netflix.  This is an must-watch film for everyone, especially parents with teenagers, pre-teens and young adults.</p>

<p>Given some of the important issues raised in this episode, we will be recording Part 2, where we bring in a panel of specialists to start the discussions on how to address the practicality and privacy issues which can prevent track and trace apps from being effective during a pandemic.</p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong>.</p>

<p><strong>Guest</strong><br>
This episode features a software professional with 30 years experience in software projects across a multitude of industries including retail, banking, defence and automotive and for the last 10 years, the NHS.  David founded a successful IT company which provides services to the NHS and writes for <a href="https://lockdownsceptics.org/" rel="nofollow">https://lockdownsceptics.org/</a>  a blog founded by Toby Young, where a range of pandemic related data is analysed and presented.</p>]]>
      </content:encoded>
      <pubDate>Tue, 06 Oct 2020 18:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/1b42a7b1/01c6d9af.mp3" length="74219155" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/LT09c1YvCGuhCXyE9HxascXVKmDwTIqmNgUQja-9qhg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQzMDEv/MTY3MzQ1MjIzNC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>3085</itunes:duration>
      <itunes:summary>This episode is part of our series of updated podcasts addressing security &amp;amp; privacy concerns resulting from the coronavirus pandemic and the shift in working practises for millions of businesses across the UK and the world. 

In our discussion we first talk about the NHS Track and Trace app and ask "how did we get here?" with app #2 being released five months after app #1.

We then explore whether track and trace apps are prevented from being successful due to privacy and practicality issues and whether this is a worldwide problem.    

During our discussion, I recommend a very important film "The Social Dilemma" which is available on Netflix.  This is an must-watch film for everyone, especially parents with teenagers, pre-teens and young adults.

Given some of the important issues raised in this episode, we will be recording Part 2, where we bring in a panel of specialists to start the discussions on how to address the practicality and privacy issues which can prevent track and trace apps from being effective during a pandemic.

GDPR Now! Is brought to you by Data Protection 4 Business &amp;amp; This Is DPO.
www.dpo4business.co.uk
www.thisisdpo.co.uk.

Guest
This episode features a software professional with 30 years experience in software projects across a multitude of industries including retail, banking, defence and automotive and for the last 10 years, the NHS.  David founded a successful IT company which provides services to the NHS and writes for https://lockdownsceptics.org/  a blog founded by Toby Young, where a range of pandemic related data is analysed and presented.</itunes:summary>
      <itunes:subtitle>This episode is part of our series of updated podcasts addressing security &amp;amp; privacy concerns resulting from the coronavirus pandemic and the shift in working practises for millions of businesses across the UK and the world. 

In our discussion we fir</itunes:subtitle>
      <itunes:keywords>gdpr, privacy, track and trace apps, government data use, data protection, data security, covid-19, pandemic</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 23: The end of the EU-US Privacy Shield.  Now what?</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>23</itunes:episode>
      <podcast:episode>23</podcast:episode>
      <itunes:title>Episode 23: The end of the EU-US Privacy Shield.  Now what?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">60b183ff-999b-4ca2-bc96-e915eccc68d1</guid>
      <link>https://share.transistor.fm/s/12471609</link>
      <description>
        <![CDATA[<p>Today we depart from the corornavirus related stories to bring you an update on the landmark ruling from the European Court of Justice on the EU - US  Privacy Shield.  </p>

<p>The decision by the ECJ on 16th July 2020, to invalidate the EU - US Privacy Shield has sent shockwaves across organisations in the EU and US.  </p>

<p>We are joined by fellow host, Mark Sherwood-Edwards, lawyer, data protection specialist and founder of ThisisDPO. Mark has read the judgement and is going to talk to us today about what it means for data protection, for businesses and for DPO’s. </p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong>.</p>

<p><strong>Guest</strong><br>
Mark Sherwood-Edwards<br>
Founder <br>
ThisisDPO<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Today we depart from the corornavirus related stories to bring you an update on the landmark ruling from the European Court of Justice on the EU - US  Privacy Shield.  </p>

<p>The decision by the ECJ on 16th July 2020, to invalidate the EU - US Privacy Shield has sent shockwaves across organisations in the EU and US.  </p>

<p>We are joined by fellow host, Mark Sherwood-Edwards, lawyer, data protection specialist and founder of ThisisDPO. Mark has read the judgement and is going to talk to us today about what it means for data protection, for businesses and for DPO’s. </p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong>.</p>

<p><strong>Guest</strong><br>
Mark Sherwood-Edwards<br>
Founder <br>
ThisisDPO<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></p>]]>
      </content:encoded>
      <pubDate>Mon, 27 Jul 2020 09:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/12471609/954c9c87.mp3" length="35747514" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/YwMw1YuieM2MGaiWC4p7FvNA2pcibFEVhvYXFvB3vXk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQzMDAv/MTY3MzQ1MjIzOC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2223</itunes:duration>
      <itunes:summary>Today we depart from the corornavirus related stories to bring you an update on the landmark ruling from the European Court of Justice on the EU - US  Privacy Shield.  

The decision by the ECJ on 16th July 2020, to invalidate the EU - US Privacy Shield has sent shockwaves across organisations in the EU and US.  

We are joined by fellow host, Mark Sherwood-Edwards, lawyer, data protection specialist and founder of ThisisDPO. Mark has read the judgement and is going to talk to us today about what it means for data protection, for businesses and for DPO’s. 

GDPR Now! Is brought to you by Data Protection 4 Business &amp;amp; This Is DPO.
www.dpo4business.co.uk
www.thisisdpo.co.uk.

Guest
Mark Sherwood-Edwards
Founder 
ThisisDPO
www.thisisdpo.co.uk</itunes:summary>
      <itunes:subtitle>Today we depart from the corornavirus related stories to bring you an update on the landmark ruling from the European Court of Justice on the EU - US  Privacy Shield.  

The decision by the ECJ on 16th July 2020, to invalidate the EU - US Privacy Shield h</itunes:subtitle>
      <itunes:keywords>gdpr, Privacy shield, ECJ, SCC, BCR, data transfers</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 22: How do you know if your data has been compromised?</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>22</itunes:episode>
      <podcast:episode>22</podcast:episode>
      <itunes:title>Episode 22: How do you know if your data has been compromised?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">4f568846-db09-42a1-bab2-10731c3157eb</guid>
      <link>https://share.transistor.fm/s/77c796e1</link>
      <description>
        <![CDATA[<p>This episode is part of our series of updated podcasts addressing security &amp; privacy concerns resulting from the coronavirus pandemic and the shift in working practises for millions of businesses across the UK and the world. </p>

<p>In this episode we are delighted to have Andrew Alston, founding director at Breach Aware and Business intelligence Theoroms.  </p>

<p>Andrew talks to us about Breach Aware which is a data breach monitoring and reporting application designed to help organisations detect and prevent crime, as part of their system of risk management.  The solution can be used for SME's and individuals as well as large organisations.  Andrew and his team pride themselves in offering this solution at affordable rates for SME's.</p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong>.</p>

<p><strong>Guest</strong><br>
Andrew Alston<br>
Founding Director<br>
Breach Aware<br>
<a href="mailto:Andrew@BITs.Company" rel="nofollow">Andrew@BITs.Company</a></p><p>Special Guest: Andrew Alston.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode is part of our series of updated podcasts addressing security &amp; privacy concerns resulting from the coronavirus pandemic and the shift in working practises for millions of businesses across the UK and the world. </p>

<p>In this episode we are delighted to have Andrew Alston, founding director at Breach Aware and Business intelligence Theoroms.  </p>

<p>Andrew talks to us about Breach Aware which is a data breach monitoring and reporting application designed to help organisations detect and prevent crime, as part of their system of risk management.  The solution can be used for SME's and individuals as well as large organisations.  Andrew and his team pride themselves in offering this solution at affordable rates for SME's.</p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong>.</p>

<p><strong>Guest</strong><br>
Andrew Alston<br>
Founding Director<br>
Breach Aware<br>
<a href="mailto:Andrew@BITs.Company" rel="nofollow">Andrew@BITs.Company</a></p><p>Special Guest: Andrew Alston.</p>]]>
      </content:encoded>
      <pubDate>Wed, 08 Jul 2020 15:30:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/77c796e1/b9c83c23.mp3" length="21130203" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/DVukPXP0GUjRGegqnASd_N6xNSgD_GJPq-gGoNAi1_o/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyOTkv/MTY3MzQ1MjIzMi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1309</itunes:duration>
      <itunes:summary>This episode is part of our series of updated podcasts addressing security &amp;amp; privacy concerns resulting from the coronavirus pandemic and the shift in working practises for millions of businesses across the UK and the world. 

In this episode we are delighted to have Andrew Alston, founding director at Breach Aware and Business intelligence Theoroms.  

Andrew talks to us about Breach Aware which is a data breach monitoring and reporting application designed to help organisations detect and prevent crime, as part of their system of risk management.  The solution can be used for SME's and individuals as well as large organisations.  Andrew and his team pride themselves in offering this solution at affordable rates for SME's.

GDPR Now! Is brought to you by Data Protection 4 Business &amp;amp; This Is DPO.
www.dpo4business.co.uk
www.thisisdpo.co.uk.

Guest
Andrew Alston
Founding Director
Breach Aware
Andrew@BITs.CompanySpecial Guest: Andrew Alston.</itunes:summary>
      <itunes:subtitle>This episode is part of our series of updated podcasts addressing security &amp;amp; privacy concerns resulting from the coronavirus pandemic and the shift in working practises for millions of businesses across the UK and the world. 

In this episode we are d</itunes:subtitle>
      <itunes:keywords>gdpr, data breach, compromised credentials, dark web monitoring, cyber attacks</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 21: Whose data is it anyway? Impact on track and track apps</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>21</itunes:episode>
      <podcast:episode>21</podcast:episode>
      <itunes:title>Episode 21: Whose data is it anyway? Impact on track and track apps</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">734eb642-0e1b-4a55-bc24-bd8614fa36f3</guid>
      <link>https://share.transistor.fm/s/0610003b</link>
      <description>
        <![CDATA[<p>This episode is part of our series of updated podcasts addressing security &amp; privacy concerns resulting from the coronavirus pandemic and the shift in working practises for millions of businesses across the UK and the world. </p>

<p>In this episode, we are going discuss personal data in detail and explore the question of: whose data is it anyway?  And what are we prepared to tolerate regarding track and trace programmes as governments around the world implement track and track apps.  To discuss this we are delighted to have Phil Brown, The Norfolk Data Protection Mardler, who advices clients in Norfolk on data protection.</p>

<p>_Please note:  Phil makes reference to the need for self reporting but would like to clarify that in the NHS Test and Trace scheme, an NHS Tracker will only contact individuals who have tested positive for Covid19.  Whether someone should be tested at all is heavily dependent on self reporting. Furthermore, responses to a possible request to us to identify those with whom we may have had recent close contact is based on our ‘civic duty’ rather than a legal requirement - so it’s very much down to our willingness or judgment to do so.</p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong>.</p>

<p><strong>Guest/s</strong><br>
Phil Brown<br>
Data Protection Consultant<br>
<a href="mailto:pa@datamardler.co.uk" rel="nofollow">pa@datamardler.co.uk</a></p>

<p>Phil is an independent data protection consultant based in North Norfolk and has provided data protection advice and support to a wide variety of industries across Norfolk and beyond, mostly to small businesses. Prior to that, Phil had a 20 year career as a military communications officer which was then followed by 12 years in the world of mobile phone standardisation, mostly consulting for a Japanese mobile phone operator. </p>

<p>During the latter phase, he chaired an international working group that developed mobile phone conformance tests and also chaired the Global Certification Forum when is became a legal entity in 2008. Such work has seen him travel widely and has, at various times, studied French, German, Japanese and Mandarin Chinese none of which prepared him for life in Norfolk when he moved there in 2016! </p>

<p>He has a Masters degree in Design of Information Systems and his currently trading as Norfolk’s Data Protection Mardler. </p><p>Special Guest: Phil Brown.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode is part of our series of updated podcasts addressing security &amp; privacy concerns resulting from the coronavirus pandemic and the shift in working practises for millions of businesses across the UK and the world. </p>

<p>In this episode, we are going discuss personal data in detail and explore the question of: whose data is it anyway?  And what are we prepared to tolerate regarding track and trace programmes as governments around the world implement track and track apps.  To discuss this we are delighted to have Phil Brown, The Norfolk Data Protection Mardler, who advices clients in Norfolk on data protection.</p>

<p>_Please note:  Phil makes reference to the need for self reporting but would like to clarify that in the NHS Test and Trace scheme, an NHS Tracker will only contact individuals who have tested positive for Covid19.  Whether someone should be tested at all is heavily dependent on self reporting. Furthermore, responses to a possible request to us to identify those with whom we may have had recent close contact is based on our ‘civic duty’ rather than a legal requirement - so it’s very much down to our willingness or judgment to do so.</p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<strong><a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></strong><br>
<strong><a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a></strong>.</p>

<p><strong>Guest/s</strong><br>
Phil Brown<br>
Data Protection Consultant<br>
<a href="mailto:pa@datamardler.co.uk" rel="nofollow">pa@datamardler.co.uk</a></p>

<p>Phil is an independent data protection consultant based in North Norfolk and has provided data protection advice and support to a wide variety of industries across Norfolk and beyond, mostly to small businesses. Prior to that, Phil had a 20 year career as a military communications officer which was then followed by 12 years in the world of mobile phone standardisation, mostly consulting for a Japanese mobile phone operator. </p>

<p>During the latter phase, he chaired an international working group that developed mobile phone conformance tests and also chaired the Global Certification Forum when is became a legal entity in 2008. Such work has seen him travel widely and has, at various times, studied French, German, Japanese and Mandarin Chinese none of which prepared him for life in Norfolk when he moved there in 2016! </p>

<p>He has a Masters degree in Design of Information Systems and his currently trading as Norfolk’s Data Protection Mardler. </p><p>Special Guest: Phil Brown.</p>]]>
      </content:encoded>
      <pubDate>Thu, 18 Jun 2020 13:30:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/0610003b/1c9c7705.mp3" length="23245293" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/Ime2Vd482Dvr0UaukBJo2BTEu1QX_iuPoWt616nq6Rc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyOTgv/MTY3MzQ1MjIyNi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1441</itunes:duration>
      <itunes:summary>This episode is part of our series of updated podcasts addressing security &amp;amp; privacy concerns resulting from the coronavirus pandemic and the shift in working practises for millions of businesses across the UK and the world. 

In this episode, we are going discuss personal data in detail and explore the question of: whose data is it anyway?  And what are we prepared to tolerate regarding track and trace programmes as governments around the world implement track and track apps.  To discuss this we are delighted to have Phil Brown, The Norfolk Data Protection Mardler, who advices clients in Norfolk on data protection.

_Please note:  Phil makes reference to the need for self reporting but would like to clarify that in the NHS Test and Trace scheme, an NHS Tracker will only contact individuals who have tested positive for Covid19.  Whether someone should be tested at all is heavily dependent on self reporting. Furthermore, responses to a possible request to us to identify those with whom we may have had recent close contact is based on our ‘civic duty’ rather than a legal requirement - so it’s very much down to our willingness or judgment to do so.

GDPR Now! Is brought to you by Data Protection 4 Business &amp;amp; This Is DPO.
www.dpo4business.co.uk
www.thisisdpo.co.uk.

Guest/s
Phil Brown
Data Protection Consultant
pa@datamardler.co.uk

Phil is an independent data protection consultant based in North Norfolk and has provided data protection advice and support to a wide variety of industries across Norfolk and beyond, mostly to small businesses. Prior to that, Phil had a 20 year career as a military communications officer which was then followed by 12 years in the world of mobile phone standardisation, mostly consulting for a Japanese mobile phone operator. 

During the latter phase, he chaired an international working group that developed mobile phone conformance tests and also chaired the Global Certification Forum when is became a legal entity in 2008. Such work has seen him travel widely and has, at various times, studied French, German, Japanese and Mandarin Chinese none of which prepared him for life in Norfolk when he moved there in 2016! 

He has a Masters degree in Design of Information Systems and his currently trading as Norfolk’s Data Protection Mardler. Special Guest: Phil Brown.</itunes:summary>
      <itunes:subtitle>This episode is part of our series of updated podcasts addressing security &amp;amp; privacy concerns resulting from the coronavirus pandemic and the shift in working practises for millions of businesses across the UK and the world. 

In this episode, we are </itunes:subtitle>
      <itunes:keywords>gdpr, privacy, track and trace apps, data protection, covid-19</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 20: Track and trace apps: views from Australia</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>20</itunes:episode>
      <podcast:episode>20</podcast:episode>
      <itunes:title>Episode 20: Track and trace apps: views from Australia</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">3e4fd145-5e10-464b-a4cf-e469f50650ae</guid>
      <link>https://share.transistor.fm/s/3d9634e1</link>
      <description>
        <![CDATA[<p>This episode is part of our series of updated podcasts addressing security &amp; privacy concerns resulting from the coronavirus pandemic and the shift in working practises for millions of businesses across the UK and the world. </p>

<p>In this episode, we start our series of discussions on track and trace apps from around the world.  </p>

<p>Today, we are are discovering how track and trace is being managed in Australia.  To discuss this with us, we are delighted to have Katherine Sainty and Belyndy Rowe from Sainty Law, a boutique law firm specialising in privacy, big data, technology &amp; cybersecurity in Sydney.  Katherine and Belyndy are going to talk to us about what is happening in Australia.</p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a><br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest/s</strong><br>
<strong>Katherine Sainty</strong><br>
Director<br>
Katherine is the founder and team leader at Sainty Law. Katherine is a corporate and commercial lawyer who specialises in digital, technology and media law.<br>
<a href="http://www.saintylaw.com.au/" rel="nofollow">http://www.saintylaw.com.au/</a></p>

<p><strong>Belyndy Rowe</strong><br>
Senior Associate<br>
Belyndy advises commercial and creative industry clients in commercial transactions, intellectual property and technology law.<br>
Email:  <a href="mailto:belyndy.rowe@saintylaw.com.au" rel="nofollow">belyndy.rowe@saintylaw.com.au</a><br>
<a href="http://www.saintylaw.com.au/" rel="nofollow">http://www.saintylaw.com.au/</a></p><p>Special Guests: Belyndy Rowe and Katherine Sainty.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>This episode is part of our series of updated podcasts addressing security &amp; privacy concerns resulting from the coronavirus pandemic and the shift in working practises for millions of businesses across the UK and the world. </p>

<p>In this episode, we start our series of discussions on track and trace apps from around the world.  </p>

<p>Today, we are are discovering how track and trace is being managed in Australia.  To discuss this with us, we are delighted to have Katherine Sainty and Belyndy Rowe from Sainty Law, a boutique law firm specialising in privacy, big data, technology &amp; cybersecurity in Sydney.  Katherine and Belyndy are going to talk to us about what is happening in Australia.</p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a><br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest/s</strong><br>
<strong>Katherine Sainty</strong><br>
Director<br>
Katherine is the founder and team leader at Sainty Law. Katherine is a corporate and commercial lawyer who specialises in digital, technology and media law.<br>
<a href="http://www.saintylaw.com.au/" rel="nofollow">http://www.saintylaw.com.au/</a></p>

<p><strong>Belyndy Rowe</strong><br>
Senior Associate<br>
Belyndy advises commercial and creative industry clients in commercial transactions, intellectual property and technology law.<br>
Email:  <a href="mailto:belyndy.rowe@saintylaw.com.au" rel="nofollow">belyndy.rowe@saintylaw.com.au</a><br>
<a href="http://www.saintylaw.com.au/" rel="nofollow">http://www.saintylaw.com.au/</a></p><p>Special Guests: Belyndy Rowe and Katherine Sainty.</p>]]>
      </content:encoded>
      <pubDate>Tue, 02 Jun 2020 11:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/3d9634e1/ded25871.mp3" length="23144493" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/SpddoER9KTfLK2VTkimCDXWTpykkHHQCDe_B8-3p20w/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyOTcv/MTY3MzQ1MjIyMy1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1435</itunes:duration>
      <itunes:summary>This episode is part of our series of updated podcasts addressing security &amp;amp; privacy concerns resulting from the coronavirus pandemic and the shift in working practises for millions of businesses across the UK and the world. 

In this episode, we start our series of discussions on track and trace apps from around the world.  

Today, we are are discovering how track and trace is being managed in Australia.  To discuss this with us, we are delighted to have Katherine Sainty and Belyndy Rowe from Sainty Law, a boutique law firm specialising in privacy, big data, technology &amp;amp; cybersecurity in Sydney.  Katherine and Belyndy are going to talk to us about what is happening in Australia.

GDPR Now! Is brought to you by Data Protection 4 Business &amp;amp; This Is DPO.
www.dpo4business.co.uk
www.thisisdpo.co.uk.

Guest/s
Katherine Sainty
Director
Katherine is the founder and team leader at Sainty Law. Katherine is a corporate and commercial lawyer who specialises in digital, technology and media law.
http://www.saintylaw.com.au/

Belyndy Rowe
Senior Associate
Belyndy advises commercial and creative industry clients in commercial transactions, intellectual property and technology law.
Email:  belyndy.rowe@saintylaw.com.au
http://www.saintylaw.com.au/Special Guests: Belyndy Rowe and Katherine Sainty.</itunes:summary>
      <itunes:subtitle>This episode is part of our series of updated podcasts addressing security &amp;amp; privacy concerns resulting from the coronavirus pandemic and the shift in working practises for millions of businesses across the UK and the world. 

In this episode, we star</itunes:subtitle>
      <itunes:keywords>gdpr, privacy, track and trace apps, data protection, data security, covid-19</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 19: The rise of Cyber crime: security challenges for SME's</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>19</itunes:episode>
      <podcast:episode>19</podcast:episode>
      <itunes:title>Episode 19: The rise of Cyber crime: security challenges for SME's</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">ebd30c27-743c-46c1-8738-a0346511ef3b</guid>
      <link>https://share.transistor.fm/s/bab2c3b5</link>
      <description>
        <![CDATA[<p>Regular listeners will have already heard our episodes on what DPOs need to know about cyber security, and COVID 19 impact on data protection.</p><p>
gdpr, privacy, data security, cyber crime, data protection, SME<br>
In this episode, we are going to talk about the exponential rise of cyber crime as a business, the need to understand the risks and the security challenges for SME's.  This episode is part of our series of updated podcasts addressing security &amp; privacy concerns resulting from the coronavirus pandemic and the shift in working practises for millions of businesses across the UK and the world.</p>

<p>We are delighted to have Zohar Rozenberg (Col. Ret.) who is the Chief Security Officer at Elron, a leading Israeli holding company dedicated to building technology companies. </p>

<p>Aside from an impressive career in Israeli defence and cyber security, Zohar has written a number of recent articles on cyber issues:</p>

<p><a href="https://www.cisomag.com/cyber-startup-hub-in-israel-declines-as-global-competition-rises-elron-vp/" rel="nofollow">https://www.cisomag.com/cyber-startup-hub-in-israel-declines-as-global-competition-rises-elron-vp/</a><br>
<a href="https://www.theepochtimes.com/coronavirus-hackers-try-to-take-advantage-of-people-working-from-home_3275525.html" rel="nofollow">https://www.theepochtimes.com/coronavirus-hackers-try-to-take-advantage-of-people-working-from-home_3275525.html</a><br>
<a href="https://siliconangle.com/2020/03/13/coronavirus-offers-golden-opportunity-evolve-security-architecture/" rel="nofollow">https://siliconangle.com/2020/03/13/coronavirus-offers-golden-opportunity-evolve-security-architecture/</a><br>
<a href="https://www.jpost.com/middle-east/cyber-attacks-new-maritime-threat-warns-former-idf-cyber-head-599165" rel="nofollow">https://www.jpost.com/middle-east/cyber-attacks-new-maritime-threat-warns-former-idf-cyber-head-599165</a><br>
<a href="https://www.helpnetsecurity.com/2020/03/11/coronavirus-evolve-security-architecture/" rel="nofollow">https://www.helpnetsecurity.com/2020/03/11/coronavirus-evolve-security-architecture/</a></p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a><br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest/s</strong><br>
Zohar Rosenberg<br>
Chief Security Officer &amp; Board Member<br>
Elron Electronic Industries (TASE: ELRN)<br>
<a href="http://www.elron.com" rel="nofollow">www.elron.com</a><br>
<a href="mailto:adir@davidmalits.com" rel="nofollow">adir@davidmalits.com</a></p><p>Special Guest: Zohar Rosenberg.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Regular listeners will have already heard our episodes on what DPOs need to know about cyber security, and COVID 19 impact on data protection.</p><p>
gdpr, privacy, data security, cyber crime, data protection, SME<br>
In this episode, we are going to talk about the exponential rise of cyber crime as a business, the need to understand the risks and the security challenges for SME's.  This episode is part of our series of updated podcasts addressing security &amp; privacy concerns resulting from the coronavirus pandemic and the shift in working practises for millions of businesses across the UK and the world.</p>

<p>We are delighted to have Zohar Rozenberg (Col. Ret.) who is the Chief Security Officer at Elron, a leading Israeli holding company dedicated to building technology companies. </p>

<p>Aside from an impressive career in Israeli defence and cyber security, Zohar has written a number of recent articles on cyber issues:</p>

<p><a href="https://www.cisomag.com/cyber-startup-hub-in-israel-declines-as-global-competition-rises-elron-vp/" rel="nofollow">https://www.cisomag.com/cyber-startup-hub-in-israel-declines-as-global-competition-rises-elron-vp/</a><br>
<a href="https://www.theepochtimes.com/coronavirus-hackers-try-to-take-advantage-of-people-working-from-home_3275525.html" rel="nofollow">https://www.theepochtimes.com/coronavirus-hackers-try-to-take-advantage-of-people-working-from-home_3275525.html</a><br>
<a href="https://siliconangle.com/2020/03/13/coronavirus-offers-golden-opportunity-evolve-security-architecture/" rel="nofollow">https://siliconangle.com/2020/03/13/coronavirus-offers-golden-opportunity-evolve-security-architecture/</a><br>
<a href="https://www.jpost.com/middle-east/cyber-attacks-new-maritime-threat-warns-former-idf-cyber-head-599165" rel="nofollow">https://www.jpost.com/middle-east/cyber-attacks-new-maritime-threat-warns-former-idf-cyber-head-599165</a><br>
<a href="https://www.helpnetsecurity.com/2020/03/11/coronavirus-evolve-security-architecture/" rel="nofollow">https://www.helpnetsecurity.com/2020/03/11/coronavirus-evolve-security-architecture/</a></p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a><br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest/s</strong><br>
Zohar Rosenberg<br>
Chief Security Officer &amp; Board Member<br>
Elron Electronic Industries (TASE: ELRN)<br>
<a href="http://www.elron.com" rel="nofollow">www.elron.com</a><br>
<a href="mailto:adir@davidmalits.com" rel="nofollow">adir@davidmalits.com</a></p><p>Special Guest: Zohar Rosenberg.</p>]]>
      </content:encoded>
      <pubDate>Fri, 29 May 2020 11:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/bab2c3b5/63b9843e.mp3" length="24608870" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/jY4dbIrKOXeQ3AvbcXWft8dKywk68YtOfWqL0XDcf6Q/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyOTYv/MTY3MzQ1MjIyMS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1526</itunes:duration>
      <itunes:summary>Regular listeners will have already heard our episodes on what DPOs need to know about cyber security, and COVID 19 impact on data protection.
gdpr, privacy, data security, cyber crime, data protection, SME
In this episode, we are going to talk about the exponential rise of cyber crime as a business, the need to understand the risks and the security challenges for SME's.  This episode is part of our series of updated podcasts addressing security &amp;amp; privacy concerns resulting from the coronavirus pandemic and the shift in working practises for millions of businesses across the UK and the world.

We are delighted to have Zohar Rozenberg (Col. Ret.) who is the Chief Security Officer at Elron, a leading Israeli holding company dedicated to building technology companies. 

Aside from an impressive career in Israeli defence and cyber security, Zohar has written a number of recent articles on cyber issues:

https://www.cisomag.com/cyber-startup-hub-in-israel-declines-as-global-competition-rises-elron-vp/
https://www.theepochtimes.com/coronavirus-hackers-try-to-take-advantage-of-people-working-from-home_3275525.html
https://siliconangle.com/2020/03/13/coronavirus-offers-golden-opportunity-evolve-security-architecture/
https://www.jpost.com/middle-east/cyber-attacks-new-maritime-threat-warns-former-idf-cyber-head-599165
https://www.helpnetsecurity.com/2020/03/11/coronavirus-evolve-security-architecture/

GDPR Now! Is brought to you by Data Protection 4 Business &amp;amp; This Is DPO.
www.dpo4business.co.uk
www.thisisdpo.co.uk.

Guest/s
Zohar Rosenberg
Chief Security Officer &amp;amp; Board Member
Elron Electronic Industries (TASE: ELRN)
www.elron.com
adir@davidmalits.comSpecial Guest: Zohar Rosenberg.</itunes:summary>
      <itunes:subtitle>Regular listeners will have already heard our episodes on what DPOs need to know about cyber security, and COVID 19 impact on data protection.
gdpr, privacy, data security, cyber crime, data protection, SME
In this episode, we are going to talk about the </itunes:subtitle>
      <itunes:keywords>gdpr, privacy, data security, cyber crime, data protection, SME</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 18: Group Action lawsuits from data breaches: what business leaders and your DPO needs to know</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>18</itunes:episode>
      <podcast:episode>18</podcast:episode>
      <itunes:title>Episode 18: Group Action lawsuits from data breaches: what business leaders and your DPO needs to know</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">213d5047-09ee-4db5-9234-8a6c5c395759</guid>
      <link>https://share.transistor.fm/s/75a75c13</link>
      <description>
        <![CDATA[<p>Welcome to another episode of GDPR Now, a podcast dedicated to data protection and all things data security and privacy.  This week’s episode is Group Action lawsuits arising from data breaches.</p>

<p>We continue our series of podcasts addressing concerns resulting from the coronavirus pandemic, such as increases in data breaches arising from IT security issues and the increased risks resulting from the huge shift to remote working for 100,000s businesses across the UK and the world. </p>

<p>In the studio today we are delighted to have Kingsley Hayes, Managing Director of Hayes Connor Solicitors based in Widnes, Cheshire.  In this second episode, we are going to talk about Group Action lawsuits, what they are, how they operate and the British Airways case.   For anyone who wants to join the BA data breach action if they have been affected - the link is <a href="https://www.hayesconnor.co.uk/british-airways-data-breaches/" rel="nofollow">here</a>.</p>

<p>If you missed it, Kingsley and I discussed COVID19 and the impact on Data Protection in Episode 17.</p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a><br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest/s</strong><br>
Kingsley Hayes<br>
Managing Director<br>
Hayes Connor Solicitors<br>
<a href="http://www.hayesconnor.co.uk" rel="nofollow">www.hayesconnor.co.uk</a><br>
@HayesConnorSol <br>
0330 107 5165</p><p>Special Guest: Kingsley Hayes.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to another episode of GDPR Now, a podcast dedicated to data protection and all things data security and privacy.  This week’s episode is Group Action lawsuits arising from data breaches.</p>

<p>We continue our series of podcasts addressing concerns resulting from the coronavirus pandemic, such as increases in data breaches arising from IT security issues and the increased risks resulting from the huge shift to remote working for 100,000s businesses across the UK and the world. </p>

<p>In the studio today we are delighted to have Kingsley Hayes, Managing Director of Hayes Connor Solicitors based in Widnes, Cheshire.  In this second episode, we are going to talk about Group Action lawsuits, what they are, how they operate and the British Airways case.   For anyone who wants to join the BA data breach action if they have been affected - the link is <a href="https://www.hayesconnor.co.uk/british-airways-data-breaches/" rel="nofollow">here</a>.</p>

<p>If you missed it, Kingsley and I discussed COVID19 and the impact on Data Protection in Episode 17.</p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a><br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest/s</strong><br>
Kingsley Hayes<br>
Managing Director<br>
Hayes Connor Solicitors<br>
<a href="http://www.hayesconnor.co.uk" rel="nofollow">www.hayesconnor.co.uk</a><br>
@HayesConnorSol <br>
0330 107 5165</p><p>Special Guest: Kingsley Hayes.</p>]]>
      </content:encoded>
      <pubDate>Mon, 18 May 2020 08:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/75a75c13/be859c5c.mp3" length="26108909" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/hqmvv2an_rZZwBV3mwSx8vTSgJe3Olc-XWpXbLeilhs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyOTUv/MTY3MzQ1MjIxOS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1620</itunes:duration>
      <itunes:summary>Welcome to another episode of GDPR Now, a podcast dedicated to data protection and all things data security and privacy.  This week’s episode is Group Action lawsuits arising from data breaches.

We continue our series of podcasts addressing concerns resulting from the coronavirus pandemic, such as increases in data breaches arising from IT security issues and the increased risks resulting from the huge shift to remote working for 100,000s businesses across the UK and the world. 

In the studio today we are delighted to have Kingsley Hayes, Managing Director of Hayes Connor Solicitors based in Widnes, Cheshire.  In this second episode, we are going to talk about Group Action lawsuits, what they are, how they operate and the British Airways case.   For anyone who wants to join the BA data breach action if they have been affected - the link is here.

If you missed it, Kingsley and I discussed COVID19 and the impact on Data Protection in Episode 17.

GDPR Now! Is brought to you by Data Protection 4 Business &amp;amp; This Is DPO.
www.dpo4business.co.uk
www.thisisdpo.co.uk.

Guest/s
Kingsley Hayes
Managing Director
Hayes Connor Solicitors
www.hayesconnor.co.uk
@HayesConnorSol 
0330 107 5165Special Guest: Kingsley Hayes.</itunes:summary>
      <itunes:subtitle>Welcome to another episode of GDPR Now, a podcast dedicated to data protection and all things data security and privacy.  This week’s episode is Group Action lawsuits arising from data breaches.

We continue our series of podcasts addressing concerns resu</itunes:subtitle>
      <itunes:keywords>gdpr, DPO, data breach, class actions</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>COVID 19 Pandemic and the impact on Data Protection</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>17</itunes:episode>
      <podcast:episode>17</podcast:episode>
      <itunes:title>COVID 19 Pandemic and the impact on Data Protection</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">8e1da529-45be-4dec-a476-1d2f9bdc803b</guid>
      <link>https://share.transistor.fm/s/ccd50ef4</link>
      <description>
        <![CDATA[<p>Welcome to another episode of GDPR Now, a podcast dedicated to data protection and all things data security and data privacy.  This week’s episode is COVID 19 and the impact on Data Protection.</p>

<p>Regular listeners will have already heard our episodes on what DPOs need to know about cyber security, for those that missed them, they are episodes 7 &amp; 15.  Today, we start a series of podcasts addressing concerns resulting from the coronavirus pandemic and the shift in working practises for 100,000s businesses across the UK and the world. </p>

<p>In the studio today we are delighted to have Kingsley Hayes, Managing Director of Hayes Connor Solicitors based in Widnes, Cheshire.  In this first of two episodes, we are going to talk about Covid 19 and the impact on data protection.  </p>

<p>In our second episode, Kingsley and I will be discussing data breach Group Action law suits in general, and the BA action in particular.  We cover the reputational and financial risks businesses need to be aware of when Group Actions, are filed as a result of data breaches.  </p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a><br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest/s</strong><br>
Kingsley Hayes<br>
Managing Director<br>
Hayes Connor Solicitors<br>
<a href="http://www.hayesconnor.co.uk" rel="nofollow">www.hayesconnor.co.uk</a><br>
@HayesConnorSol <br>
0330 107 5165</p>

<p><strong>Host</strong><br>
Karen Heaton<br>
<a href="mailto:info@dpo4business.co.uk" rel="nofollow">info@dpo4business.co.uk</a><br>
<a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></p>

<p>This podcast is brought to you by thisisdpo.co.uk and Data Protection 4 Business.  For more information, go to thisisdpo.co.uk or dpo4business.co.uk.   </p>

<p>All suggestions for topics, improvement etc are gratefully received or if you want to appear on the podcast, please contact us at <a href="mailto:info@dpo4business.co.uk" rel="nofollow">info@dpo4business.co.uk</a>.</p><p>Special Guest: Kingsley Hayes.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Welcome to another episode of GDPR Now, a podcast dedicated to data protection and all things data security and data privacy.  This week’s episode is COVID 19 and the impact on Data Protection.</p>

<p>Regular listeners will have already heard our episodes on what DPOs need to know about cyber security, for those that missed them, they are episodes 7 &amp; 15.  Today, we start a series of podcasts addressing concerns resulting from the coronavirus pandemic and the shift in working practises for 100,000s businesses across the UK and the world. </p>

<p>In the studio today we are delighted to have Kingsley Hayes, Managing Director of Hayes Connor Solicitors based in Widnes, Cheshire.  In this first of two episodes, we are going to talk about Covid 19 and the impact on data protection.  </p>

<p>In our second episode, Kingsley and I will be discussing data breach Group Action law suits in general, and the BA action in particular.  We cover the reputational and financial risks businesses need to be aware of when Group Actions, are filed as a result of data breaches.  </p>

<p>GDPR Now! Is brought to you by Data Protection 4 Business &amp; This Is DPO.<br>
<a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a><br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest/s</strong><br>
Kingsley Hayes<br>
Managing Director<br>
Hayes Connor Solicitors<br>
<a href="http://www.hayesconnor.co.uk" rel="nofollow">www.hayesconnor.co.uk</a><br>
@HayesConnorSol <br>
0330 107 5165</p>

<p><strong>Host</strong><br>
Karen Heaton<br>
<a href="mailto:info@dpo4business.co.uk" rel="nofollow">info@dpo4business.co.uk</a><br>
<a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></p>

<p>This podcast is brought to you by thisisdpo.co.uk and Data Protection 4 Business.  For more information, go to thisisdpo.co.uk or dpo4business.co.uk.   </p>

<p>All suggestions for topics, improvement etc are gratefully received or if you want to appear on the podcast, please contact us at <a href="mailto:info@dpo4business.co.uk" rel="nofollow">info@dpo4business.co.uk</a>.</p><p>Special Guest: Kingsley Hayes.</p>]]>
      </content:encoded>
      <pubDate>Thu, 14 May 2020 10:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/ccd50ef4/61630605.mp3" length="26794404" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/8IdoC89caYlESDms1aQ3p1XYvHpLA7KV2e65vBq7djk/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyOTQv/MTY3MzQ1MjIxOS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1663</itunes:duration>
      <itunes:summary>Welcome to another episode of GDPR Now, a podcast dedicated to data protection and all things data security and data privacy.  This week’s episode is COVID 19 and the impact on Data Protection.

Regular listeners will have already heard our episodes on what DPOs need to know about cyber security, for those that missed them, they are episodes 7 &amp;amp; 15.  Today, we start a series of podcasts addressing concerns resulting from the coronavirus pandemic and the shift in working practises for 100,000s businesses across the UK and the world. 

In the studio today we are delighted to have Kingsley Hayes, Managing Director of Hayes Connor Solicitors based in Widnes, Cheshire.  In this first of two episodes, we are going to talk about Covid 19 and the impact on data protection.  

In our second episode, Kingsley and I will be discussing data breach Group Action law suits in general, and the BA action in particular.  We cover the reputational and financial risks businesses need to be aware of when Group Actions, are filed as a result of data breaches.  

GDPR Now! Is brought to you by Data Protection 4 Business &amp;amp; This Is DPO.
www.dpo4business.co.uk
www.thisisdpo.co.uk.

Guest/s
Kingsley Hayes
Managing Director
Hayes Connor Solicitors
www.hayesconnor.co.uk
@HayesConnorSol 
0330 107 5165

Host
Karen Heaton
info@dpo4business.co.uk
www.dpo4business.co.uk

This podcast is brought to you by thisisdpo.co.uk and Data Protection 4 Business.  For more information, go to thisisdpo.co.uk or dpo4business.co.uk.   

All suggestions for topics, improvement etc are gratefully received or if you want to appear on the podcast, please contact us at info@dpo4business.co.uk.Special Guest: Kingsley Hayes.</itunes:summary>
      <itunes:subtitle>Welcome to another episode of GDPR Now, a podcast dedicated to data protection and all things data security and data privacy.  This week’s episode is COVID 19 and the impact on Data Protection.

Regular listeners will have already heard our episodes on wh</itunes:subtitle>
      <itunes:keywords>gdpr, privacy, COVID19, data security, data protection, cyber security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 16: Digital Detox - how to cleanse yourself on Data Protection Day</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>16</itunes:episode>
      <podcast:episode>16</podcast:episode>
      <itunes:title>Episode 16: Digital Detox - how to cleanse yourself on Data Protection Day</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">109bdb6e-9122-4011-bee4-f65ed9d40fd0</guid>
      <link>https://share.transistor.fm/s/aefbc414</link>
      <description>
        <![CDATA[<p>On the day after Data Protection Day (or Privacy Day, depending on whether you are  tomato or tomato) we take a look at privacy enhancing technologies - how to control, restrict and eliminate your personal data footprint (if that’s what you want to do).  This podcast will be invaluable for privacy professionals that want to know what PETs are available and for consumers that would like to have greater control of their digital profiles.</p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest/s</strong><br>
Abigail Dubiniecki<br>
Data Protection Specialist<br>
My Inhouse Lawyer<br>
<a href="https://www.linkedin.com/in/abigaild/" rel="nofollow">https://www.linkedin.com/in/abigaild/</a></p>

<p><strong>Host</strong><br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p><strong>Materials</strong><br>
<strong>Competition and Markets Authority (UK competition regulator) report on digital advertising</strong><br>
<a href="https://www.gov.uk/government/news/cma-lifts-the-lid-on-digital-giants" rel="nofollow">https://www.gov.uk/government/news/cma-lifts-the-lid-on-digital-giants</a></p>

<p><strong>Links to PETs</strong><br>
(Privacy Enhancing Tech) and resources mentioned in the podcast (and more!) <br>
Disclaimer – not endorsing any PET in particular, just sharing info.</p>

<p>Want a pretty version or more explanation? Check out my LinkedIn profile for a Slideshare of a presentation and handy Infographic – available next week. Let’s help build this list. </p>

<p>Which PETs are you using or curious to try? If they’re not here, let Abigail know via contact details in the show notes so I can update my list. </p>

<p><strong>Inform yourself, update software, adjust privacy settings, use 2FA!</strong></p>

<p><strong>Privacy Analyzer</strong><br>
(<a href="https://privacy.net/analyzer):" rel="nofollow">https://privacy.net/analyzer):</a> Analyses your browser to reveal what can be learned about you and recommend actions you can take</p>

<p><strong>DuckDuckGo Device Privacy Tips</strong><br>
<a href="https://spreadprivacy.com/tag/device-privacy-tips/" rel="nofollow">https://spreadprivacy.com/tag/device-privacy-tips/</a> <br>
‘Learn’ tab in the DisconnectMe Privacy Pro VPN (iOS only) – ‘learn’ materials available without paying. Just download the app and click!: <a href="https://apps.apple.com/us/app/disconnect-privacy-pro-entire/id1057771839?ls=1" rel="nofollow">https://apps.apple.com/us/app/disconnect-privacy-pro-entire/id1057771839?ls=1</a>  </p>

<p><strong>Consumer Reports articles &amp; videos with quick-fixes in bite-sized pieces:</strong> <a href="https://www.consumerreports.org/privacy/linkedin-privacy-settings/" rel="nofollow">https://www.consumerreports.org/privacy/linkedin-privacy-settings/</a><br>
<a href="http://www.consumerreports.org/video/view/electronics/news/6050416388001/protecting-your-online-privacy/" rel="nofollow">www.consumerreports.org/video/view/electronics/news/6050416388001/protecting-your-online-privacy/</a> </p>

<p>Terms of Service, Didn’t Read (TOSDR <a href="https://tosdr.org/):" rel="nofollow">https://tosdr.org/):</a> one-stop shop for digested Ts &amp; Cs of most popular online providers, including score cards. Brilliant browser add-on offers automatic assessment of pages you access. Addresses privacy notices &amp; terms e.g. cancellation, etc.</p>

<p><strong>Ghostery</strong> <br>
(<a href="http://www.ghostery.com" rel="nofollow">www.ghostery.com</a>) lets you block ads and trackers, watch the watchers, and speed up your browser with a suite of products, some of which are free, others reasonably privacy. A new product – Ghostery Midnight (<a href="http://www.ghostery.com/midnight" rel="nofollow">www.ghostery.com/midnight</a>) – claims to protect your entire device while giving granular preference management at the app-by app level. Sounds like having your own personal privacy watchdog on your device.  Extension is free!! But some of the other products are paid.</p>

<p><strong>Baycloud</strong> (<a href="https://baycloud.com" rel="nofollow">https://baycloud.com</a>) was one of the early champions of privtech, starting in the DNT space. They offer B2C and B2B resources. Baycloud Bouncer let reveals who’s tracking you and gives you a handy dashboard to adjust your preferences (<a href="https://baycloud.com/bouncer" rel="nofollow">https://baycloud.com/bouncer</a>). You can also pre-scan websites you’d like to visit from the comfort of Baycloud’s site. Try before you buy (so to speak, with your data I mean). Free!!</p>

<p><strong>Have I been pwned?</strong>(<a href="https://haveibeenpwned.com" rel="nofollow">https://haveibeenpwned.com</a>) will help you check whether your account or credentials has been compromised based on research into the (sigh) multitudinous data breaches. Free!!</p>

<p><strong>DuckDuckGo privacy report card for websites</strong> (<a href="https://duckduckgo.com/app):" rel="nofollow">https://duckduckgo.com/app):</a> instantly evaluates and remediates websites you visit to give you a before and after score. Browser add-on for various browser types on desktop but only available for iOS on mobile. Free!!</p>

<p><strong>Deseat.Me</strong> (<a href="http://www.deseat.me" rel="nofollow">www.deseat.me</a>) : Helps you clean up your online presence by instantly getting a list of all your accounts, allowing you to sort through and delete them / unsubscribe. </p>

<p><strong>Personal Data.io:</strong>  A self-named “integrated toolbox addressing surveillance capitalism”. This advocacy group goes beyond providing tools for e.g. filing DSARs, there is a forum (<a href="https://forum.personaldata.io" rel="nofollow">https://forum.personaldata.io</a>) and a number of chat groups  for trouble-shooting, contributing, advocacy and knowledge-exchange) You can share your experience or tap into people’s expertise, commiserate or find journalists to raise awareness about your experience or discoveries. This is the group that helped journalist Judith Duportail, who was researching dating apps, learn that Tinder had over 800 (disturbing) pages of data on her. Worth a read here: <a href="https://www.theguardian.com/technology/2017/sep/26/tinder-personal-data-dating-app-messages-hacked-sold" rel="nofollow">https://www.theguardian.com/technology/2017/sep/26/tinder-personal-data-dating-app-messages-hacked-sold</a></p>

<p><strong>My Permissions</strong>(<a href="https://mypermissions.com):" rel="nofollow">https://mypermissions.com):</a> app that does a privacy scan (Privacy Cleaner) of your social media / collaboration apps to help you identify who can access your data. It identifies your current permissions and let’s you quickly and efficiently manage them all from one place. A small fee required to manage permissions, but there is a free tier.</p>

<p><strong>Princeton IoT Inspector</strong> (<a href="https://iot-inspector.princeton.edu/" rel="nofollow">https://iot-inspector.princeton.edu/</a>) let’s you watch your smart devices back.  Automatically discovers IoT devices and analyzes their network traffic to identify security and privacy issues. Currently only available on MacOS High Sierra or Mojave (waitlist for Windows, Linus and MacOS Catalina).</p>

<p><strong>PiHole for Raspberry Pi</strong> (<a href="https://pi-hole.net):" rel="nofollow">https://pi-hole.net):</a>  Protect your entire network from ads and targeting. Block in-app and SmartTV ads. Free!! but powered by donations. You need a supported OS and hardware (Raspberry Pi). </p>

<p><strong>Strong Passwords: NCSC ‘3 random words’ guidance:</strong> </p>

<p><a href="https://www.ncsc.gov.uk/collection/top-tips-for-staying-secure-online/use-a-strong-and-separate-password-for-email" rel="nofollow">https://www.ncsc.gov.uk/collection/top-tips-for-staying-secure-online/use-a-strong-and-separate-password-for-email</a>. </p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>On the day after Data Protection Day (or Privacy Day, depending on whether you are  tomato or tomato) we take a look at privacy enhancing technologies - how to control, restrict and eliminate your personal data footprint (if that’s what you want to do).  This podcast will be invaluable for privacy professionals that want to know what PETs are available and for consumers that would like to have greater control of their digital profiles.</p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest/s</strong><br>
Abigail Dubiniecki<br>
Data Protection Specialist<br>
My Inhouse Lawyer<br>
<a href="https://www.linkedin.com/in/abigaild/" rel="nofollow">https://www.linkedin.com/in/abigaild/</a></p>

<p><strong>Host</strong><br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p><strong>Materials</strong><br>
<strong>Competition and Markets Authority (UK competition regulator) report on digital advertising</strong><br>
<a href="https://www.gov.uk/government/news/cma-lifts-the-lid-on-digital-giants" rel="nofollow">https://www.gov.uk/government/news/cma-lifts-the-lid-on-digital-giants</a></p>

<p><strong>Links to PETs</strong><br>
(Privacy Enhancing Tech) and resources mentioned in the podcast (and more!) <br>
Disclaimer – not endorsing any PET in particular, just sharing info.</p>

<p>Want a pretty version or more explanation? Check out my LinkedIn profile for a Slideshare of a presentation and handy Infographic – available next week. Let’s help build this list. </p>

<p>Which PETs are you using or curious to try? If they’re not here, let Abigail know via contact details in the show notes so I can update my list. </p>

<p><strong>Inform yourself, update software, adjust privacy settings, use 2FA!</strong></p>

<p><strong>Privacy Analyzer</strong><br>
(<a href="https://privacy.net/analyzer):" rel="nofollow">https://privacy.net/analyzer):</a> Analyses your browser to reveal what can be learned about you and recommend actions you can take</p>

<p><strong>DuckDuckGo Device Privacy Tips</strong><br>
<a href="https://spreadprivacy.com/tag/device-privacy-tips/" rel="nofollow">https://spreadprivacy.com/tag/device-privacy-tips/</a> <br>
‘Learn’ tab in the DisconnectMe Privacy Pro VPN (iOS only) – ‘learn’ materials available without paying. Just download the app and click!: <a href="https://apps.apple.com/us/app/disconnect-privacy-pro-entire/id1057771839?ls=1" rel="nofollow">https://apps.apple.com/us/app/disconnect-privacy-pro-entire/id1057771839?ls=1</a>  </p>

<p><strong>Consumer Reports articles &amp; videos with quick-fixes in bite-sized pieces:</strong> <a href="https://www.consumerreports.org/privacy/linkedin-privacy-settings/" rel="nofollow">https://www.consumerreports.org/privacy/linkedin-privacy-settings/</a><br>
<a href="http://www.consumerreports.org/video/view/electronics/news/6050416388001/protecting-your-online-privacy/" rel="nofollow">www.consumerreports.org/video/view/electronics/news/6050416388001/protecting-your-online-privacy/</a> </p>

<p>Terms of Service, Didn’t Read (TOSDR <a href="https://tosdr.org/):" rel="nofollow">https://tosdr.org/):</a> one-stop shop for digested Ts &amp; Cs of most popular online providers, including score cards. Brilliant browser add-on offers automatic assessment of pages you access. Addresses privacy notices &amp; terms e.g. cancellation, etc.</p>

<p><strong>Ghostery</strong> <br>
(<a href="http://www.ghostery.com" rel="nofollow">www.ghostery.com</a>) lets you block ads and trackers, watch the watchers, and speed up your browser with a suite of products, some of which are free, others reasonably privacy. A new product – Ghostery Midnight (<a href="http://www.ghostery.com/midnight" rel="nofollow">www.ghostery.com/midnight</a>) – claims to protect your entire device while giving granular preference management at the app-by app level. Sounds like having your own personal privacy watchdog on your device.  Extension is free!! But some of the other products are paid.</p>

<p><strong>Baycloud</strong> (<a href="https://baycloud.com" rel="nofollow">https://baycloud.com</a>) was one of the early champions of privtech, starting in the DNT space. They offer B2C and B2B resources. Baycloud Bouncer let reveals who’s tracking you and gives you a handy dashboard to adjust your preferences (<a href="https://baycloud.com/bouncer" rel="nofollow">https://baycloud.com/bouncer</a>). You can also pre-scan websites you’d like to visit from the comfort of Baycloud’s site. Try before you buy (so to speak, with your data I mean). Free!!</p>

<p><strong>Have I been pwned?</strong>(<a href="https://haveibeenpwned.com" rel="nofollow">https://haveibeenpwned.com</a>) will help you check whether your account or credentials has been compromised based on research into the (sigh) multitudinous data breaches. Free!!</p>

<p><strong>DuckDuckGo privacy report card for websites</strong> (<a href="https://duckduckgo.com/app):" rel="nofollow">https://duckduckgo.com/app):</a> instantly evaluates and remediates websites you visit to give you a before and after score. Browser add-on for various browser types on desktop but only available for iOS on mobile. Free!!</p>

<p><strong>Deseat.Me</strong> (<a href="http://www.deseat.me" rel="nofollow">www.deseat.me</a>) : Helps you clean up your online presence by instantly getting a list of all your accounts, allowing you to sort through and delete them / unsubscribe. </p>

<p><strong>Personal Data.io:</strong>  A self-named “integrated toolbox addressing surveillance capitalism”. This advocacy group goes beyond providing tools for e.g. filing DSARs, there is a forum (<a href="https://forum.personaldata.io" rel="nofollow">https://forum.personaldata.io</a>) and a number of chat groups  for trouble-shooting, contributing, advocacy and knowledge-exchange) You can share your experience or tap into people’s expertise, commiserate or find journalists to raise awareness about your experience or discoveries. This is the group that helped journalist Judith Duportail, who was researching dating apps, learn that Tinder had over 800 (disturbing) pages of data on her. Worth a read here: <a href="https://www.theguardian.com/technology/2017/sep/26/tinder-personal-data-dating-app-messages-hacked-sold" rel="nofollow">https://www.theguardian.com/technology/2017/sep/26/tinder-personal-data-dating-app-messages-hacked-sold</a></p>

<p><strong>My Permissions</strong>(<a href="https://mypermissions.com):" rel="nofollow">https://mypermissions.com):</a> app that does a privacy scan (Privacy Cleaner) of your social media / collaboration apps to help you identify who can access your data. It identifies your current permissions and let’s you quickly and efficiently manage them all from one place. A small fee required to manage permissions, but there is a free tier.</p>

<p><strong>Princeton IoT Inspector</strong> (<a href="https://iot-inspector.princeton.edu/" rel="nofollow">https://iot-inspector.princeton.edu/</a>) let’s you watch your smart devices back.  Automatically discovers IoT devices and analyzes their network traffic to identify security and privacy issues. Currently only available on MacOS High Sierra or Mojave (waitlist for Windows, Linus and MacOS Catalina).</p>

<p><strong>PiHole for Raspberry Pi</strong> (<a href="https://pi-hole.net):" rel="nofollow">https://pi-hole.net):</a>  Protect your entire network from ads and targeting. Block in-app and SmartTV ads. Free!! but powered by donations. You need a supported OS and hardware (Raspberry Pi). </p>

<p><strong>Strong Passwords: NCSC ‘3 random words’ guidance:</strong> </p>

<p><a href="https://www.ncsc.gov.uk/collection/top-tips-for-staying-secure-online/use-a-strong-and-separate-password-for-email" rel="nofollow">https://www.ncsc.gov.uk/collection/top-tips-for-staying-secure-online/use-a-strong-and-separate-password-for-email</a>. </p>]]>
      </content:encoded>
      <pubDate>Tue, 28 Jan 2020 14:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/aefbc414/28256abc.mp3" length="41770796" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/fBCzxqbeNUObLTEOL9vgWBhTr2264JXHU078x3a6gEw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyOTMv/MTY3MzQ1MjIxOS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2597</itunes:duration>
      <itunes:summary>On the day after Data Protection Day (or Privacy Day, depending on whether you are  tomato or tomato) we take a look at privacy enhancing technologies - how to control, restrict and eliminate your personal data footprint (if that’s what you want to do).  This podcast will be invaluable for privacy professionals that want to know what PETs are available and for consumers that would like to have greater control of their digital profiles.

GDPR Now! Is brought to you by This Is DPO.
www.thisisdpo.co.uk.

Guest/s
Abigail Dubiniecki
Data Protection Specialist
My Inhouse Lawyer
https://www.linkedin.com/in/abigaild/

Host
Mark Sherwood-Edwards 
info@thisisdpo.co.uk

Materials
Competition and Markets Authority (UK competition regulator) report on digital advertising
https://www.gov.uk/government/news/cma-lifts-the-lid-on-digital-giants

Links to PETs
(Privacy Enhancing Tech) and resources mentioned in the podcast (and more!) 
Disclaimer – not endorsing any PET in particular, just sharing info.

Want a pretty version or more explanation? Check out my LinkedIn profile for a Slideshare of a presentation and handy Infographic – available next week. Let’s help build this list. 

Which PETs are you using or curious to try? If they’re not here, let Abigail know via contact details in the show notes so I can update my list. 

Inform yourself, update software, adjust privacy settings, use 2FA!

Privacy Analyzer
(https://privacy.net/analyzer): Analyses your browser to reveal what can be learned about you and recommend actions you can take

DuckDuckGo Device Privacy Tips
https://spreadprivacy.com/tag/device-privacy-tips/ 
‘Learn’ tab in the DisconnectMe Privacy Pro VPN (iOS only) – ‘learn’ materials available without paying. Just download the app and click!: https://apps.apple.com/us/app/disconnect-privacy-pro-entire/id1057771839?ls=1  

Consumer Reports articles &amp;amp; videos with quick-fixes in bite-sized pieces: https://www.consumerreports.org/privacy/linkedin-privacy-settings/
www.consumerreports.org/video/view/electronics/news/6050416388001/protecting-your-online-privacy/ 

Terms of Service, Didn’t Read (TOSDR https://tosdr.org/): one-stop shop for digested Ts &amp;amp; Cs of most popular online providers, including score cards. Brilliant browser add-on offers automatic assessment of pages you access. Addresses privacy notices &amp;amp; terms e.g. cancellation, etc.

Ghostery 
(www.ghostery.com) lets you block ads and trackers, watch the watchers, and speed up your browser with a suite of products, some of which are free, others reasonably privacy. A new product – Ghostery Midnight (www.ghostery.com/midnight) – claims to protect your entire device while giving granular preference management at the app-by app level. Sounds like having your own personal privacy watchdog on your device.  Extension is free!! But some of the other products are paid.

Baycloud (https://baycloud.com) was one of the early champions of privtech, starting in the DNT space. They offer B2C and B2B resources. Baycloud Bouncer let reveals who’s tracking you and gives you a handy dashboard to adjust your preferences (https://baycloud.com/bouncer). You can also pre-scan websites you’d like to visit from the comfort of Baycloud’s site. Try before you buy (so to speak, with your data I mean). Free!!

Have I been pwned?(https://haveibeenpwned.com) will help you check whether your account or credentials has been compromised based on research into the (sigh) multitudinous data breaches. Free!!

DuckDuckGo privacy report card for websites (https://duckduckgo.com/app): instantly evaluates and remediates websites you visit to give you a before and after score. Browser add-on for various browser types on desktop but only available for iOS on mobile. Free!!

Deseat.Me (www.deseat.me) : Helps you clean up your online presence by instantly getting a list of all your accounts, allowing you to sort through and delete them / unsubscribe. 

Personal Data.io:  A self-named “integrated toolbox addressing surveillance capitalism”. This advocacy group goes beyond providing tools for e.g. filing DSARs, there is a forum (https://forum.personaldata.io) and a number of chat groups  for trouble-shooting, contributing, advocacy and knowledge-exchange) You can share your experience or tap into people’s expertise, commiserate or find journalists to raise awareness about your experience or discoveries. This is the group that helped journalist Judith Duportail, who was researching dating apps, learn that Tinder had over 800 (disturbing) pages of data on her. Worth a read here: https://www.theguardian.com/technology/2017/sep/26/tinder-personal-data-dating-app-messages-hacked-sold

My Permissions(https://mypermissions.com): app that does a privacy scan (Privacy Cleaner) of your social media / collaboration apps to help you identify who can access your data. It identifies your current permissions and let’s you quickly and efficiently manage them all from one place. A small fee required to manage permiss...</itunes:summary>
      <itunes:subtitle>On the day after Data Protection Day (or Privacy Day, depending on whether you are  tomato or tomato) we take a look at privacy enhancing technologies - how to control, restrict and eliminate your personal data footprint (if that’s what you want to do).  </itunes:subtitle>
      <itunes:keywords>gdpr, privacy, breach, data protection, PET, privacyenhancing.</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 15: Cyber security - everything a DPO needs to know.  Part 2.</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>15</itunes:episode>
      <podcast:episode>15</podcast:episode>
      <itunes:title>Episode 15: Cyber security - everything a DPO needs to know.  Part 2.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">84fc6b32-8669-4f3d-996f-ed8240f19cc7</guid>
      <link>https://share.transistor.fm/s/793db228</link>
      <description>
        <![CDATA[<p>Cyber security is an area of key concern for any DPO or privacy professional.  Having looked at people and training issues in episode 7, this episode focuses on the key physical issues: physical and technical access controls, network design considerations, default deny and least privilege, separation of duties and working in key areas. </p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest/s</strong><br>
Andy Larkum<br>
CEO of ADL Consulting<br>
<a href="https://adlconsulting.co.uk" rel="nofollow">https://adlconsulting.co.uk</a><br>
<a href="mailto:andy@adlconsulting.co.uk" rel="nofollow">andy@adlconsulting.co.uk</a></p>

<p><strong>Host</strong><br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p><strong>Materials</strong><br>
You can try ADL Consulting’s "Introduction to Cyber Security" module for free here:<br>
<a href="https://adlconsulting.teachable.com/p/an-introduction-to-cyber-security" rel="nofollow">https://adlconsulting.teachable.com/p/an-introduction-to-cyber-security</a></p>

<p><strong>From previous episode on cyber security</strong><br>
Cyber Essentials self-assessment questionnaire:<br>
<a href="https://adlconsulting.co.uk/getting-help-cyber-essentials" rel="nofollow">https://adlconsulting.co.uk/getting-help-cyber-essentials</a> - see heading "What's Involved"</p>

<p>ISO 27001<br>
<a href="https://adlconsulting.co.uk/iso27001-consultancy" rel="nofollow">https://adlconsulting.co.uk/iso27001-consultancy</a></p>

<p>Training:<br>
<a href="https://adlconsulting.co.uk/staff-training" rel="nofollow">https://adlconsulting.co.uk/staff-training</a><br>
<a href="https://adlconsulting.teachable.com" rel="nofollow">https://adlconsulting.teachable.com</a></p>

<p>Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p><p>Special Guest: Andy Larkum.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Cyber security is an area of key concern for any DPO or privacy professional.  Having looked at people and training issues in episode 7, this episode focuses on the key physical issues: physical and technical access controls, network design considerations, default deny and least privilege, separation of duties and working in key areas. </p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest/s</strong><br>
Andy Larkum<br>
CEO of ADL Consulting<br>
<a href="https://adlconsulting.co.uk" rel="nofollow">https://adlconsulting.co.uk</a><br>
<a href="mailto:andy@adlconsulting.co.uk" rel="nofollow">andy@adlconsulting.co.uk</a></p>

<p><strong>Host</strong><br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p><strong>Materials</strong><br>
You can try ADL Consulting’s "Introduction to Cyber Security" module for free here:<br>
<a href="https://adlconsulting.teachable.com/p/an-introduction-to-cyber-security" rel="nofollow">https://adlconsulting.teachable.com/p/an-introduction-to-cyber-security</a></p>

<p><strong>From previous episode on cyber security</strong><br>
Cyber Essentials self-assessment questionnaire:<br>
<a href="https://adlconsulting.co.uk/getting-help-cyber-essentials" rel="nofollow">https://adlconsulting.co.uk/getting-help-cyber-essentials</a> - see heading "What's Involved"</p>

<p>ISO 27001<br>
<a href="https://adlconsulting.co.uk/iso27001-consultancy" rel="nofollow">https://adlconsulting.co.uk/iso27001-consultancy</a></p>

<p>Training:<br>
<a href="https://adlconsulting.co.uk/staff-training" rel="nofollow">https://adlconsulting.co.uk/staff-training</a><br>
<a href="https://adlconsulting.teachable.com" rel="nofollow">https://adlconsulting.teachable.com</a></p>

<p>Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p><p>Special Guest: Andy Larkum.</p>]]>
      </content:encoded>
      <pubDate>Thu, 16 Jan 2020 10:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/793db228/39f4ced4.mp3" length="42025985" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/u4K-KNHfrwz8VTWn0CVc9iTt7x-xZB-arxkKSPBnBMc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyOTIv/MTY3MzQ1MjIyMC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2615</itunes:duration>
      <itunes:summary>Cyber security is an area of key concern for any DPO or privacy professional.  Having looked at people and training issues in episode 7, this episode focuses on the key physical issues: physical and technical access controls, network design considerations, default deny and least privilege, separation of duties and working in key areas. 

GDPR Now! Is brought to you by This Is DPO.
www.thisisdpo.co.uk.

Guest/s
Andy Larkum
CEO of ADL Consulting
https://adlconsulting.co.uk
andy@adlconsulting.co.uk

Host
Mark Sherwood-Edwards 
info@thisisdpo.co.uk

Materials
You can try ADL Consulting’s "Introduction to Cyber Security" module for free here:
https://adlconsulting.teachable.com/p/an-introduction-to-cyber-security

From previous episode on cyber security
Cyber Essentials self-assessment questionnaire:
https://adlconsulting.co.uk/getting-help-cyber-essentials - see heading "What's Involved"

ISO 27001
https://adlconsulting.co.uk/iso27001-consultancy

Training:
https://adlconsulting.co.uk/staff-training
https://adlconsulting.teachable.com

Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at info@thisisdpo.co.ukSpecial Guest: Andy Larkum.</itunes:summary>
      <itunes:subtitle>Cyber security is an area of key concern for any DPO or privacy professional.  Having looked at people and training issues in episode 7, this episode focuses on the key physical issues: physical and technical access controls, network design considerations</itunes:subtitle>
      <itunes:keywords>gdpr, privacy, breach, data protection, cyber security, security</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 14: Privacy by Design</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>14</itunes:episode>
      <podcast:episode>14</podcast:episode>
      <itunes:title>Episode 14: Privacy by Design</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">385fcc81-0ccb-4fe2-976a-e3caefa2e82e</guid>
      <link>https://share.transistor.fm/s/a9e6b486</link>
      <description>
        <![CDATA[<p>Privacy By Design is one of the key elements of good data protection, and is made mandatory by Article 25 of the GDPR.  But what does PbD mean in practice? In this podcast, we look at the key elements of PbD, discuss some actual use cases, and examine how to apply PbD on the ground.</p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest</strong><br>
Sam Bouso, Founder and CEO of Precognitive Inc., <br>
<a href="mailto:sbouso@precognitive.io" rel="nofollow">sbouso@precognitive.io</a><br>
<a href="https://precognitive.com/" rel="nofollow">https://precognitive.com/</a></p>

<p><strong>Host</strong><br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p><strong>Materials</strong></p>

<p><strong>Recommended By Sam Bouso</strong><br>
Article<br>
“Privacy By Design Is Important For Every Area Of Your Business”  is a good general intro </p>

<p>Book<br>
“The Ultimate GDPR Practitioner Guide: Demystifying Privacy &amp; Data Protection” <br>
Especially Chapter 11 which has solid examples and areas of focus for those trying to implement PbD.</p>

<p><strong>Ann Cavoukian’s 7 principles of PbD</strong></p>

<p>Proactive not reactive; preventive not remedial<br>
The privacy by design approach is characterized by proactive rather than reactive measures. It anticipates and prevents privacy invasive events before they happen. Privacy by design does not wait for privacy risks to materialize, nor does it offer remedies for resolving privacy infractions once they have occurred — it aims to prevent them from occurring. In short, privacy by design comes before-the-fact, not after.</p>

<p>Privacy as the default<br>
Privacy by design seeks to deliver the maximum degree of privacy by ensuring that personal data are automatically protected in any given IT system or business practice. If an individual does nothing, their privacy still remains intact. No action is required on the part of the individual to protect their privacy — it is built into the system, by default. </p>

<p>Privacy embedded into design<br>
Privacy by design is embedded into the design and architecture of IT systems as well as business practices. It is not bolted on as an add-on, after the fact. The result is that privacy becomes an essential component of the core functionality being delivered. Privacy is integral to the system without diminishing functionality. </p>

<p>Full functionality – positive-sum, not zero-sum<br>
Privacy by design seeks to accommodate all legitimate interests and objectives in a positive-sum “win-win” manner, not through a dated, zero-sum approach, where unnecessary trade-offs are made. Privacy by design avoids the pretense of false dichotomies, such as privacy versus security, demonstrating that it is possible to have both. </p>

<p>End-to-end security – full lifecycle protection<br>
Privacy by design, having been embedded into the system prior to the first element of information being collected, extends securely throughout the entire lifecycle of the data involved — strong security measures are essential to privacy, from start to finish. This ensures that all data are securely retained, and then securely destroyed at the end of the process, in a timely fashion. Thus, privacy by design ensures cradle-to-grave, secure lifecycle management of information, end-to-end.</p>

<p>Visibility and transparency – keep it open<br>
Privacy by design seeks to assure all stakeholders that whatever the business practice or technology involved, it is in fact, operating according to the stated promises and objectives, subject to independent verification. Its component parts and operations remain visible and transparent, to users and providers alike. Remember, trust but verify. </p>

<p>Respect for user privacy – keep it user-centric<br>
Above all, privacy by design requires architects and operators to keep the interests of the individual uppermost by offering such measures as strong privacy defaults, appropriate notice, and empowering user-friendly options. Keep it user-centric. </p>

<p>See also:<br>
<a href="https://iab.org/wp-content/IAB-uploads/2011/03/fred_carter.pdf" rel="nofollow">https://iab.org/wp-content/IAB-uploads/2011/03/fred_carter.pdf</a></p>

<p><a href="https://iapp.org/resources/article/privacy-by-design-the-7-foundational-principles/" rel="nofollow">https://iapp.org/resources/article/privacy-by-design-the-7-foundational-principles/</a></p>

<p><strong>Looking for something long and technical?</strong><br>
"Privacy and Data Protection by Design – from policy to engineering". ENISA</p>

<p>Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p><p>Special Guest: Sam Bouso.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Privacy By Design is one of the key elements of good data protection, and is made mandatory by Article 25 of the GDPR.  But what does PbD mean in practice? In this podcast, we look at the key elements of PbD, discuss some actual use cases, and examine how to apply PbD on the ground.</p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest</strong><br>
Sam Bouso, Founder and CEO of Precognitive Inc., <br>
<a href="mailto:sbouso@precognitive.io" rel="nofollow">sbouso@precognitive.io</a><br>
<a href="https://precognitive.com/" rel="nofollow">https://precognitive.com/</a></p>

<p><strong>Host</strong><br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p><strong>Materials</strong></p>

<p><strong>Recommended By Sam Bouso</strong><br>
Article<br>
“Privacy By Design Is Important For Every Area Of Your Business”  is a good general intro </p>

<p>Book<br>
“The Ultimate GDPR Practitioner Guide: Demystifying Privacy &amp; Data Protection” <br>
Especially Chapter 11 which has solid examples and areas of focus for those trying to implement PbD.</p>

<p><strong>Ann Cavoukian’s 7 principles of PbD</strong></p>

<p>Proactive not reactive; preventive not remedial<br>
The privacy by design approach is characterized by proactive rather than reactive measures. It anticipates and prevents privacy invasive events before they happen. Privacy by design does not wait for privacy risks to materialize, nor does it offer remedies for resolving privacy infractions once they have occurred — it aims to prevent them from occurring. In short, privacy by design comes before-the-fact, not after.</p>

<p>Privacy as the default<br>
Privacy by design seeks to deliver the maximum degree of privacy by ensuring that personal data are automatically protected in any given IT system or business practice. If an individual does nothing, their privacy still remains intact. No action is required on the part of the individual to protect their privacy — it is built into the system, by default. </p>

<p>Privacy embedded into design<br>
Privacy by design is embedded into the design and architecture of IT systems as well as business practices. It is not bolted on as an add-on, after the fact. The result is that privacy becomes an essential component of the core functionality being delivered. Privacy is integral to the system without diminishing functionality. </p>

<p>Full functionality – positive-sum, not zero-sum<br>
Privacy by design seeks to accommodate all legitimate interests and objectives in a positive-sum “win-win” manner, not through a dated, zero-sum approach, where unnecessary trade-offs are made. Privacy by design avoids the pretense of false dichotomies, such as privacy versus security, demonstrating that it is possible to have both. </p>

<p>End-to-end security – full lifecycle protection<br>
Privacy by design, having been embedded into the system prior to the first element of information being collected, extends securely throughout the entire lifecycle of the data involved — strong security measures are essential to privacy, from start to finish. This ensures that all data are securely retained, and then securely destroyed at the end of the process, in a timely fashion. Thus, privacy by design ensures cradle-to-grave, secure lifecycle management of information, end-to-end.</p>

<p>Visibility and transparency – keep it open<br>
Privacy by design seeks to assure all stakeholders that whatever the business practice or technology involved, it is in fact, operating according to the stated promises and objectives, subject to independent verification. Its component parts and operations remain visible and transparent, to users and providers alike. Remember, trust but verify. </p>

<p>Respect for user privacy – keep it user-centric<br>
Above all, privacy by design requires architects and operators to keep the interests of the individual uppermost by offering such measures as strong privacy defaults, appropriate notice, and empowering user-friendly options. Keep it user-centric. </p>

<p>See also:<br>
<a href="https://iab.org/wp-content/IAB-uploads/2011/03/fred_carter.pdf" rel="nofollow">https://iab.org/wp-content/IAB-uploads/2011/03/fred_carter.pdf</a></p>

<p><a href="https://iapp.org/resources/article/privacy-by-design-the-7-foundational-principles/" rel="nofollow">https://iapp.org/resources/article/privacy-by-design-the-7-foundational-principles/</a></p>

<p><strong>Looking for something long and technical?</strong><br>
"Privacy and Data Protection by Design – from policy to engineering". ENISA</p>

<p>Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p><p>Special Guest: Sam Bouso.</p>]]>
      </content:encoded>
      <pubDate>Wed, 27 Nov 2019 09:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/a9e6b486/603d37c5.mp3" length="38803240" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/n4cZEKM9AgnJnc8NV1ZGpWpBScFWKO7Sluh5wG0uA8U/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyOTEv/MTY3MzQ1MjIxNi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2413</itunes:duration>
      <itunes:summary>Privacy By Design is one of the key elements of good data protection, and is made mandatory by Article 25 of the GDPR.  But what does PbD mean in practice? In this podcast, we look at the key elements of PbD, discuss some actual use cases, and examine how to apply PbD on the ground.

GDPR Now! Is brought to you by This Is DPO.
www.thisisdpo.co.uk.

Guest
Sam Bouso, Founder and CEO of Precognitive Inc., 
sbouso@precognitive.io
https://precognitive.com/

Host
Mark Sherwood-Edwards 
info@thisisdpo.co.uk

Materials

Recommended By Sam Bouso
Article
“Privacy By Design Is Important For Every Area Of Your Business”  is a good general intro 

Book
“The Ultimate GDPR Practitioner Guide: Demystifying Privacy &amp;amp; Data Protection” 
Especially Chapter 11 which has solid examples and areas of focus for those trying to implement PbD.

Ann Cavoukian’s 7 principles of PbD

Proactive not reactive; preventive not remedial
The privacy by design approach is characterized by proactive rather than reactive measures. It anticipates and prevents privacy invasive events before they happen. Privacy by design does not wait for privacy risks to materialize, nor does it offer remedies for resolving privacy infractions once they have occurred — it aims to prevent them from occurring. In short, privacy by design comes before-the-fact, not after.

Privacy as the default
Privacy by design seeks to deliver the maximum degree of privacy by ensuring that personal data are automatically protected in any given IT system or business practice. If an individual does nothing, their privacy still remains intact. No action is required on the part of the individual to protect their privacy — it is built into the system, by default. 

Privacy embedded into design
Privacy by design is embedded into the design and architecture of IT systems as well as business practices. It is not bolted on as an add-on, after the fact. The result is that privacy becomes an essential component of the core functionality being delivered. Privacy is integral to the system without diminishing functionality. 

Full functionality – positive-sum, not zero-sum
Privacy by design seeks to accommodate all legitimate interests and objectives in a positive-sum “win-win” manner, not through a dated, zero-sum approach, where unnecessary trade-offs are made. Privacy by design avoids the pretense of false dichotomies, such as privacy versus security, demonstrating that it is possible to have both. 

End-to-end security – full lifecycle protection
Privacy by design, having been embedded into the system prior to the first element of information being collected, extends securely throughout the entire lifecycle of the data involved — strong security measures are essential to privacy, from start to finish. This ensures that all data are securely retained, and then securely destroyed at the end of the process, in a timely fashion. Thus, privacy by design ensures cradle-to-grave, secure lifecycle management of information, end-to-end.

Visibility and transparency – keep it open
Privacy by design seeks to assure all stakeholders that whatever the business practice or technology involved, it is in fact, operating according to the stated promises and objectives, subject to independent verification. Its component parts and operations remain visible and transparent, to users and providers alike. Remember, trust but verify. 

Respect for user privacy – keep it user-centric
Above all, privacy by design requires architects and operators to keep the interests of the individual uppermost by offering such measures as strong privacy defaults, appropriate notice, and empowering user-friendly options. Keep it user-centric. 

See also:
https://iab.org/wp-content/IAB-uploads/2011/03/fred_carter.pdf

https://iapp.org/resources/article/privacy-by-design-the-7-foundational-principles/

Looking for something long and technical?
"Privacy and Data Protection by Design – from policy to engineering". ENISA

Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at info@thisisdpo.co.ukSpecial Guest: Sam Bouso.</itunes:summary>
      <itunes:subtitle>Privacy By Design is one of the key elements of good data protection, and is made mandatory by Article 25 of the GDPR.  But what does PbD mean in practice? In this podcast, we look at the key elements of PbD, discuss some actual use cases, and examine how</itunes:subtitle>
      <itunes:keywords>gdpr, privacy, breach, data protection.</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 13: Governance – what’s needed to run a good data protection regime?</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>13</itunes:episode>
      <podcast:episode>13</podcast:episode>
      <itunes:title>Episode 13: Governance – what’s needed to run a good data protection regime?</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">fac934a9-ab46-4462-8e2f-c94af66befad</guid>
      <link>https://share.transistor.fm/s/349077b5</link>
      <description>
        <![CDATA[<p>What are the building blocks of good data protection governance?  In this broad-ranging discussion, we talk to James Leaton Gray about his assessment of current data protection in the UK, what it takes to run a good data protection regime, different target operating models, how different parts of the business need to work together, the evolving role of the DPO, privacy and privsec, common mistakes and – critically – how move the data protection regime up the value chain.  Plus the opportunities open to organisations that manage to establish a relationship of trust with their data subjects. </p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest</strong><br>
James Leaton Gray, Director of The Privacy Practice.<br>
<a href="http://www.privacypractice.co.uk/" rel="nofollow">http://www.privacypractice.co.uk/</a><br>
Email: <a href="mailto:jlg@leatongray.com" rel="nofollow">jlg@leatongray.com</a><br>
Telephone: +44 7740 818036</p>

<p><strong>Host</strong><br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p><strong>Materials</strong><br>
None relevant</p>

<p>Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p><p>Special Guest: James Leaton Gray.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What are the building blocks of good data protection governance?  In this broad-ranging discussion, we talk to James Leaton Gray about his assessment of current data protection in the UK, what it takes to run a good data protection regime, different target operating models, how different parts of the business need to work together, the evolving role of the DPO, privacy and privsec, common mistakes and – critically – how move the data protection regime up the value chain.  Plus the opportunities open to organisations that manage to establish a relationship of trust with their data subjects. </p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest</strong><br>
James Leaton Gray, Director of The Privacy Practice.<br>
<a href="http://www.privacypractice.co.uk/" rel="nofollow">http://www.privacypractice.co.uk/</a><br>
Email: <a href="mailto:jlg@leatongray.com" rel="nofollow">jlg@leatongray.com</a><br>
Telephone: +44 7740 818036</p>

<p><strong>Host</strong><br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p><strong>Materials</strong><br>
None relevant</p>

<p>Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p><p>Special Guest: James Leaton Gray.</p>]]>
      </content:encoded>
      <pubDate>Mon, 04 Nov 2019 10:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/349077b5/c99fa220.mp3" length="42477383" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/nLQkaS-bJH_65xQq9CTPPvL17YPwuJTqBJ1DpV3qGfw/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyOTAv/MTY3MzQ1MjIxMC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2643</itunes:duration>
      <itunes:summary>What are the building blocks of good data protection governance?  In this broad-ranging discussion, we talk to James Leaton Gray about his assessment of current data protection in the UK, what it takes to run a good data protection regime, different target operating models, how different parts of the business need to work together, the evolving role of the DPO, privacy and privsec, common mistakes and – critically – how move the data protection regime up the value chain.  Plus the opportunities open to organisations that manage to establish a relationship of trust with their data subjects. 

GDPR Now! Is brought to you by This Is DPO.
www.thisisdpo.co.uk.

Guest
James Leaton Gray, Director of The Privacy Practice.
http://www.privacypractice.co.uk/
Email: jlg@leatongray.com
Telephone: +44 7740 818036

Host
Mark Sherwood-Edwards 
info@thisisdpo.co.uk

Materials
None relevant

Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at info@thisisdpo.co.ukSpecial Guest: James Leaton Gray.</itunes:summary>
      <itunes:subtitle>What are the building blocks of good data protection governance?  In this broad-ranging discussion, we talk to James Leaton Gray about his assessment of current data protection in the UK, what it takes to run a good data protection regime, different targe</itunes:subtitle>
      <itunes:keywords>gdpr, privacy, breach, data protection.</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 12: Brexit!</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>12</itunes:episode>
      <podcast:episode>12</podcast:episode>
      <itunes:title>Episode 12: Brexit!</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">cb5d5715-bfc5-433d-8518-78be915fd9d0</guid>
      <link>https://share.transistor.fm/s/83b3ba39</link>
      <description>
        <![CDATA[<p>What do UK companies need to do if the UK crashes out of the EU?  This podcast discusses the privacy implications for UK companies after October 31st and what they should be doing – now – to prepare for a hard Brexit. </p>

<p>At the time this podcast was recorded, a hard Brexit is scheduled for October 31st</p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest</strong><br>
Oana Dolea<br>
GDPR Practice Lead, D2 Legal Technology<br>
Email: <a href="mailto:oana.dolea@d2legaltech.com" rel="nofollow">oana.dolea@d2legaltech.com</a><br>
Website: <a href="http://www.d2legaltech.com" rel="nofollow">www.d2legaltech.com</a></p>

<p>D2 Legal Technology LLP<br>
Level 39<br>
One Canada Square<br>
London E14 5AB<br>
Telephone: +44 737 747 2019</p>

<p><strong>Host</strong><br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p><strong>Materials</strong></p>

<p>The Data Protection Implications of a 'No-Deal Brexit', Douwe Korff<br>
<a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3441617" rel="nofollow">https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3441617</a></p>

<p>EDPB Information note on data transfers under the GDPR in the<br>
event of a no-deal Brexit<br>
<a href="https://edpb.europa.eu/sites/edpb/files/files/file1/edpb-2019-02-12-infonote-nodeal-brexit_en.pdf" rel="nofollow">https://edpb.europa.eu/sites/edpb/files/files/file1/edpb-2019-02-12-infonote-nodeal-brexit_en.pdf</a></p>

<p>EDPB view on Article 49 derogations<br>
<a href="https://edpb.europa.eu/our-work-tools/our-documents/nasoki/guidelines-22018-derogations-article-49-under-regulation-2016679_en" rel="nofollow">https://edpb.europa.eu/our-work-tools/our-documents/nasoki/guidelines-22018-derogations-article-49-under-regulation-2016679_en</a></p>

<p><strong>Questions, ideas, appearing</strong><br>
Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p><p>Special Guest: Oana Dolea.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>What do UK companies need to do if the UK crashes out of the EU?  This podcast discusses the privacy implications for UK companies after October 31st and what they should be doing – now – to prepare for a hard Brexit. </p>

<p>At the time this podcast was recorded, a hard Brexit is scheduled for October 31st</p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest</strong><br>
Oana Dolea<br>
GDPR Practice Lead, D2 Legal Technology<br>
Email: <a href="mailto:oana.dolea@d2legaltech.com" rel="nofollow">oana.dolea@d2legaltech.com</a><br>
Website: <a href="http://www.d2legaltech.com" rel="nofollow">www.d2legaltech.com</a></p>

<p>D2 Legal Technology LLP<br>
Level 39<br>
One Canada Square<br>
London E14 5AB<br>
Telephone: +44 737 747 2019</p>

<p><strong>Host</strong><br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p><strong>Materials</strong></p>

<p>The Data Protection Implications of a 'No-Deal Brexit', Douwe Korff<br>
<a href="https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3441617" rel="nofollow">https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3441617</a></p>

<p>EDPB Information note on data transfers under the GDPR in the<br>
event of a no-deal Brexit<br>
<a href="https://edpb.europa.eu/sites/edpb/files/files/file1/edpb-2019-02-12-infonote-nodeal-brexit_en.pdf" rel="nofollow">https://edpb.europa.eu/sites/edpb/files/files/file1/edpb-2019-02-12-infonote-nodeal-brexit_en.pdf</a></p>

<p>EDPB view on Article 49 derogations<br>
<a href="https://edpb.europa.eu/our-work-tools/our-documents/nasoki/guidelines-22018-derogations-article-49-under-regulation-2016679_en" rel="nofollow">https://edpb.europa.eu/our-work-tools/our-documents/nasoki/guidelines-22018-derogations-article-49-under-regulation-2016679_en</a></p>

<p><strong>Questions, ideas, appearing</strong><br>
Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p><p>Special Guest: Oana Dolea.</p>]]>
      </content:encoded>
      <pubDate>Wed, 09 Oct 2019 08:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/83b3ba39/a0164f94.mp3" length="36029176" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/ZyKT9BZBmfciR-R_GQr9M7_mjMB4217DedQ7PJfs--U/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyODkv/MTY3MzQ1MjIxMC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2240</itunes:duration>
      <itunes:summary>What do UK companies need to do if the UK crashes out of the EU?  This podcast discusses the privacy implications for UK companies after October 31st and what they should be doing – now – to prepare for a hard Brexit. 

At the time this podcast was recorded, a hard Brexit is scheduled for October 31st

GDPR Now! Is brought to you by This Is DPO.
www.thisisdpo.co.uk.

Guest
Oana Dolea
GDPR Practice Lead, D2 Legal Technology
Email: oana.dolea@d2legaltech.com
Website: www.d2legaltech.com

D2 Legal Technology LLP
Level 39
One Canada Square
London E14 5AB
Telephone: +44 737 747 2019

Host
Mark Sherwood-Edwards 
info@thisisdpo.co.uk

Materials

The Data Protection Implications of a 'No-Deal Brexit', Douwe Korff
https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3441617

EDPB Information note on data transfers under the GDPR in the
event of a no-deal Brexit
https://edpb.europa.eu/sites/edpb/files/files/file1/edpb-2019-02-12-infonote-nodeal-brexit_en.pdf

EDPB view on Article 49 derogations
https://edpb.europa.eu/our-work-tools/our-documents/nasoki/guidelines-22018-derogations-article-49-under-regulation-2016679_en

Questions, ideas, appearing
Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at info@thisisdpo.co.ukSpecial Guest: Oana Dolea.</itunes:summary>
      <itunes:subtitle>What do UK companies need to do if the UK crashes out of the EU?  This podcast discusses the privacy implications for UK companies after October 31st and what they should be doing – now – to prepare for a hard Brexit. 

At the time this podcast was record</itunes:subtitle>
      <itunes:keywords>gdpr, privacy, breach, data protection, brexit, adequacy</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 10: Cookie Consent Software Reviewed!  Part 1:  What the Regulators expect</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>10</itunes:episode>
      <podcast:episode>10</podcast:episode>
      <itunes:title>Episode 10: Cookie Consent Software Reviewed!  Part 1:  What the Regulators expect</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">19231869-7838-426d-a85b-09695bb48629</guid>
      <link>https://share.transistor.fm/s/8ab9ba13</link>
      <description>
        <![CDATA[<p>Managing consent for cookies has become a key issue.  In this two-parter, we look at what the regulators (and in particular the UK ICO) require in relation to cookies (Part 1) and then – in an industry first - review three industry leading consent management tools: Cookie Control, Cookiebot, and Cookie Pro (Part 2). </p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest</strong><br>
Karen Heaton<br>
Director, Data Protection 4 Business <br>
<a href="mailto:karen.heaton@dpo4business.co.uk" rel="nofollow">karen.heaton@dpo4business.co.uk</a> <br>
<a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></p>

<p><strong>Host</strong><br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p><strong>Corrections &amp; Clarifications</strong></p>

<p>Cookie Control from Civic UK: <br>
-Cookie Control supports an unlimited number of categories. The categories can be updated/added at any point.<br>
-Cookie Control allows the user to define the time period that the consent is valid for. Also Cookie Control can be configured to request user consent if there is a change in the privacy policy of the website. <br>
-All Cookie Control Licences have no page limits including the free one. The Pro version simply offers more features like unlimited subdomains geolocation, multilingual support, integration with IAB and branding. <br>
-All licence costs are annual.</p>

<p><strong>Materials</strong><br>
If you would like copies of the completed questionnaires, please email your requests to:<br>
<a href="mailto:karen.heaton@dpo4business.co.uk" rel="nofollow">karen.heaton@dpo4business.co.uk</a> <br>
or<br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p>The three cookie consent tools reviewed are:<br>
Cookiebot<br>
<a href="https://www.cookiebot.com/" rel="nofollow">https://www.cookiebot.com/</a><br>
Contact: <a href="mailto:mail@cookiebot.com" rel="nofollow">mail@cookiebot.com</a></p>

<p>Cookie Control<br>
<a href="https://www.civicuk.com/cookie-control" rel="nofollow">https://www.civicuk.com/cookie-control</a><br>
Contact: <a href="mailto:info@civicuk.com" rel="nofollow">info@civicuk.com</a></p>

<p>CookiePro<br>
<a href="https://www.cookiepro.com" rel="nofollow">https://www.cookiepro.com</a><br>
Contact: <a href="mailto:sales@cookiepro.com" rel="nofollow">sales@cookiepro.com</a></p>

<p>Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p><p>Special Guest: Karen Heaton.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Managing consent for cookies has become a key issue.  In this two-parter, we look at what the regulators (and in particular the UK ICO) require in relation to cookies (Part 1) and then – in an industry first - review three industry leading consent management tools: Cookie Control, Cookiebot, and Cookie Pro (Part 2). </p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest</strong><br>
Karen Heaton<br>
Director, Data Protection 4 Business <br>
<a href="mailto:karen.heaton@dpo4business.co.uk" rel="nofollow">karen.heaton@dpo4business.co.uk</a> <br>
<a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></p>

<p><strong>Host</strong><br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p><strong>Corrections &amp; Clarifications</strong></p>

<p>Cookie Control from Civic UK: <br>
-Cookie Control supports an unlimited number of categories. The categories can be updated/added at any point.<br>
-Cookie Control allows the user to define the time period that the consent is valid for. Also Cookie Control can be configured to request user consent if there is a change in the privacy policy of the website. <br>
-All Cookie Control Licences have no page limits including the free one. The Pro version simply offers more features like unlimited subdomains geolocation, multilingual support, integration with IAB and branding. <br>
-All licence costs are annual.</p>

<p><strong>Materials</strong><br>
If you would like copies of the completed questionnaires, please email your requests to:<br>
<a href="mailto:karen.heaton@dpo4business.co.uk" rel="nofollow">karen.heaton@dpo4business.co.uk</a> <br>
or<br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p>The three cookie consent tools reviewed are:<br>
Cookiebot<br>
<a href="https://www.cookiebot.com/" rel="nofollow">https://www.cookiebot.com/</a><br>
Contact: <a href="mailto:mail@cookiebot.com" rel="nofollow">mail@cookiebot.com</a></p>

<p>Cookie Control<br>
<a href="https://www.civicuk.com/cookie-control" rel="nofollow">https://www.civicuk.com/cookie-control</a><br>
Contact: <a href="mailto:info@civicuk.com" rel="nofollow">info@civicuk.com</a></p>

<p>CookiePro<br>
<a href="https://www.cookiepro.com" rel="nofollow">https://www.cookiepro.com</a><br>
Contact: <a href="mailto:sales@cookiepro.com" rel="nofollow">sales@cookiepro.com</a></p>

<p>Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p><p>Special Guest: Karen Heaton.</p>]]>
      </content:encoded>
      <pubDate>Tue, 01 Oct 2019 09:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/8ab9ba13/7cb06011.mp3" length="34671653" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/tYNcwfG_Lf70jLSnwwqpz3ze16-Tca-HOrY0-MsuwSU/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyODgv/MTY3MzQ1MjIwNC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2155</itunes:duration>
      <itunes:summary>Managing consent for cookies has become a key issue.  In this two-parter, we look at what the regulators (and in particular the UK ICO) require in relation to cookies (Part 1) and then – in an industry first - review three industry leading consent management tools: Cookie Control, Cookiebot, and Cookie Pro (Part 2). 

GDPR Now! Is brought to you by This Is DPO.
www.thisisdpo.co.uk.

Guest
Karen Heaton
Director, Data Protection 4 Business 
karen.heaton@dpo4business.co.uk 
www.dpo4business.co.uk

Host
Mark Sherwood-Edwards 
info@thisisdpo.co.uk

Corrections &amp;amp; Clarifications

Cookie Control from Civic UK: 
-Cookie Control supports an unlimited number of categories. The categories can be updated/added at any point.
-Cookie Control allows the user to define the time period that the consent is valid for. Also Cookie Control can be configured to request user consent if there is a change in the privacy policy of the website. 
-All Cookie Control Licences have no page limits including the free one. The Pro version simply offers more features like unlimited subdomains geolocation, multilingual support, integration with IAB and branding. 
-All licence costs are annual.

Materials
If you would like copies of the completed questionnaires, please email your requests to:
karen.heaton@dpo4business.co.uk 
or
info@thisisdpo.co.uk

The three cookie consent tools reviewed are:
Cookiebot
https://www.cookiebot.com/
Contact: mail@cookiebot.com

Cookie Control
https://www.civicuk.com/cookie-control
Contact: info@civicuk.com

CookiePro
https://www.cookiepro.com
Contact: sales@cookiepro.com

Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at info@thisisdpo.co.ukSpecial Guest: Karen Heaton.</itunes:summary>
      <itunes:subtitle>Managing consent for cookies has become a key issue.  In this two-parter, we look at what the regulators (and in particular the UK ICO) require in relation to cookies (Part 1) and then – in an industry first - review three industry leading consent managem</itunes:subtitle>
      <itunes:keywords>gdpr, privacy, breach, data protection, cookies, consent</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 11: Cookie Consent Software Reviewed!  Part 2:  Cookiebot v. Cookie Control v. CookiePro</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>11</itunes:episode>
      <podcast:episode>11</podcast:episode>
      <itunes:title>Episode 11: Cookie Consent Software Reviewed!  Part 2:  Cookiebot v. Cookie Control v. CookiePro</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">25b9b3a4-05fa-44e5-bc0d-01b8a99d993f</guid>
      <link>https://share.transistor.fm/s/65709bea</link>
      <description>
        <![CDATA[<p>Managing consent for cookies has become a key issue.  In this two-parter, we look at what the regulators (and in particular the UK ICO) require in relation to cookies (Part 1) and then – in an industry first - review three industry leading consent management tools: Cookie Control, Cookiebot, and Cookie Pro (Part 2). </p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest</strong><br>
Karen Heaton<br>
Director, Data Protection 4 Business <br>
<a href="mailto:karen.heaton@dpo4business.co.uk" rel="nofollow">karen.heaton@dpo4business.co.uk</a> <br>
<a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></p>

<p><strong>Host</strong><br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p><strong>Corrections &amp; Clarifications</strong></p>

<p>Cookie Control from Civic UK<br>
-Cookie Control supports an unlimited number of categories. The categories can be updated/added at any point.<br>
-Cookie Control allows the user to define the time period that the consent is valid for. Also Cookie Control can be configured to request user consent if there is a change in the privacy policy of the website. <br>
-All Cookie Control Licences have no page limits including the free one. The Pro version simply offers more features like unlimited subdomains geolocation, multilingual support, integration with IAB and branding. <br>
-All licence costs are annual.</p>

<p><strong>Materials</strong><br>
If you would like copies of the completed questionnaires, please email your requests to:<br>
<a href="mailto:karen.heaton@dpo4business.co.uk" rel="nofollow">karen.heaton@dpo4business.co.uk</a> <br>
or<br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p>The three cookie consent tools reviewed are:<br>
Cookiebot<br>
<a href="https://www.cookiebot.com/" rel="nofollow">https://www.cookiebot.com/</a><br>
Contact: <a href="mailto:mail@cookiebot.com" rel="nofollow">mail@cookiebot.com</a></p>

<p>Cookie Control<br>
<a href="https://www.civicuk.com/cookie-control" rel="nofollow">https://www.civicuk.com/cookie-control</a><br>
Contact: <a href="mailto:info@civicuk.com" rel="nofollow">info@civicuk.com</a></p>

<p>CookiePro<br>
<a href="https://www.cookiepro.com" rel="nofollow">https://www.cookiepro.com</a><br>
Contact: <a href="mailto:sales@cookiepro.com" rel="nofollow">sales@cookiepro.com</a></p>

<p><strong>Questions</strong><br>
Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p><p>Special Guest: Karen Heaton.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>Managing consent for cookies has become a key issue.  In this two-parter, we look at what the regulators (and in particular the UK ICO) require in relation to cookies (Part 1) and then – in an industry first - review three industry leading consent management tools: Cookie Control, Cookiebot, and Cookie Pro (Part 2). </p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest</strong><br>
Karen Heaton<br>
Director, Data Protection 4 Business <br>
<a href="mailto:karen.heaton@dpo4business.co.uk" rel="nofollow">karen.heaton@dpo4business.co.uk</a> <br>
<a href="http://www.dpo4business.co.uk" rel="nofollow">www.dpo4business.co.uk</a></p>

<p><strong>Host</strong><br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p><strong>Corrections &amp; Clarifications</strong></p>

<p>Cookie Control from Civic UK<br>
-Cookie Control supports an unlimited number of categories. The categories can be updated/added at any point.<br>
-Cookie Control allows the user to define the time period that the consent is valid for. Also Cookie Control can be configured to request user consent if there is a change in the privacy policy of the website. <br>
-All Cookie Control Licences have no page limits including the free one. The Pro version simply offers more features like unlimited subdomains geolocation, multilingual support, integration with IAB and branding. <br>
-All licence costs are annual.</p>

<p><strong>Materials</strong><br>
If you would like copies of the completed questionnaires, please email your requests to:<br>
<a href="mailto:karen.heaton@dpo4business.co.uk" rel="nofollow">karen.heaton@dpo4business.co.uk</a> <br>
or<br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p>The three cookie consent tools reviewed are:<br>
Cookiebot<br>
<a href="https://www.cookiebot.com/" rel="nofollow">https://www.cookiebot.com/</a><br>
Contact: <a href="mailto:mail@cookiebot.com" rel="nofollow">mail@cookiebot.com</a></p>

<p>Cookie Control<br>
<a href="https://www.civicuk.com/cookie-control" rel="nofollow">https://www.civicuk.com/cookie-control</a><br>
Contact: <a href="mailto:info@civicuk.com" rel="nofollow">info@civicuk.com</a></p>

<p>CookiePro<br>
<a href="https://www.cookiepro.com" rel="nofollow">https://www.cookiepro.com</a><br>
Contact: <a href="mailto:sales@cookiepro.com" rel="nofollow">sales@cookiepro.com</a></p>

<p><strong>Questions</strong><br>
Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p><p>Special Guest: Karen Heaton.</p>]]>
      </content:encoded>
      <pubDate>Tue, 01 Oct 2019 09:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/65709bea/9da7442e.mp3" length="29169306" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/Lk6Wq49C_tjTByqbHhMONb7xbgWJ3mIuvM5ct6at6s4/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyODcv/MTY3MzQ1MjIwNC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1811</itunes:duration>
      <itunes:summary>Managing consent for cookies has become a key issue.  In this two-parter, we look at what the regulators (and in particular the UK ICO) require in relation to cookies (Part 1) and then – in an industry first - review three industry leading consent management tools: Cookie Control, Cookiebot, and Cookie Pro (Part 2). 

GDPR Now! Is brought to you by This Is DPO.
www.thisisdpo.co.uk.

Guest
Karen Heaton
Director, Data Protection 4 Business 
karen.heaton@dpo4business.co.uk 
www.dpo4business.co.uk

Host
Mark Sherwood-Edwards 
info@thisisdpo.co.uk

Corrections &amp;amp; Clarifications

Cookie Control from Civic UK
-Cookie Control supports an unlimited number of categories. The categories can be updated/added at any point.
-Cookie Control allows the user to define the time period that the consent is valid for. Also Cookie Control can be configured to request user consent if there is a change in the privacy policy of the website. 
-All Cookie Control Licences have no page limits including the free one. The Pro version simply offers more features like unlimited subdomains geolocation, multilingual support, integration with IAB and branding. 
-All licence costs are annual.

Materials
If you would like copies of the completed questionnaires, please email your requests to:
karen.heaton@dpo4business.co.uk 
or
info@thisisdpo.co.uk

The three cookie consent tools reviewed are:
Cookiebot
https://www.cookiebot.com/
Contact: mail@cookiebot.com

Cookie Control
https://www.civicuk.com/cookie-control
Contact: info@civicuk.com

CookiePro
https://www.cookiepro.com
Contact: sales@cookiepro.com

Questions
Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at info@thisisdpo.co.ukSpecial Guest: Karen Heaton.</itunes:summary>
      <itunes:subtitle>Managing consent for cookies has become a key issue.  In this two-parter, we look at what the regulators (and in particular the UK ICO) require in relation to cookies (Part 1) and then – in an industry first - review three industry leading consent managem</itunes:subtitle>
      <itunes:keywords>gdpr, privacy, breach, data protection, cookies, consent</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 8: Third Party Cookies - ECJ lays down new rules in Fashion ID case</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>8</itunes:episode>
      <podcast:episode>8</podcast:episode>
      <itunes:title>Episode 8: Third Party Cookies - ECJ lays down new rules in Fashion ID case</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">5371c018-e3f6-43d4-914f-86f02974fe2f</guid>
      <link>https://share.transistor.fm/s/21a9c7de</link>
      <description>
        <![CDATA[<p>In the Fashion ID case, the European Court of Justice decides that website owners are now joint controllers with the provider of the third-party cookie, and that website owners are responsible for issuing the privacy notices for third party cookies and for collecting any consents that are required.  And, to make things a bit more complicated, the ECJ comes up with a new approach to analysing the data journey and who is the controller!  All this and more in this episode of GDPR Now!</p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p>Host<br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p>Materials<br>
You can try ADL Consulting’s "Introduction to Cyber Security" module for free here:<br>
<a href="https://adlconsulting.teachable.com/p/an-introduction-to-cyber-security" rel="nofollow">https://adlconsulting.teachable.com/p/an-introduction-to-cyber-security</a></p>

<p>Fashion ID<br>
ECJ Judgement:  <a href="http://curia.europa.eu/juris/document/document.jsf;jsessionid=CF6549B82743BAC9782DB7D41AD478DF?text=&amp;docid=216555&amp;pageIndex=0&amp;doclang=en&amp;mode=lst&amp;dir=&amp;occ=first&amp;part=1&amp;cid=14417748" rel="nofollow">http://curia.europa.eu/juris/document/document.jsf;jsessionid=CF6549B82743BAC9782DB7D41AD478DF?text=&amp;docid=216555&amp;pageIndex=0&amp;doclang=en&amp;mode=lst&amp;dir=&amp;occ=first&amp;part=1&amp;cid=14417748</a></p>

<p>Advocate General’s Opinion: <br>
<a href="http://curia.europa.eu/juris/document/document.jsf?text=&amp;docid=209357&amp;pageIndex=0&amp;doclang=en&amp;mode=lst&amp;dir=&amp;occ=first&amp;part=1&amp;cid=14418147" rel="nofollow">http://curia.europa.eu/juris/document/document.jsf?text=&amp;docid=209357&amp;pageIndex=0&amp;doclang=en&amp;mode=lst&amp;dir=&amp;occ=first&amp;part=1&amp;cid=14418147</a></p>

<p>Related documents<br>
Update Report Into Adtech And Real Time Bidding, ICO.  <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/06/blog-ico-adtech-update-report-published-following-industry-engagement/" rel="nofollow">https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/06/blog-ico-adtech-update-report-published-following-industry-engagement/</a></p>

<p>Guidance On The Use Of Cookies And Similar Technologies, ICO.   <a href="https://ico.org.uk/for-organisations/guide-to-pecr/guidance-on-the-use-of-cookies-and-similar-technologies/" rel="nofollow">https://ico.org.uk/for-organisations/guide-to-pecr/guidance-on-the-use-of-cookies-and-similar-technologies/</a></p>

<p>Délibération N° 2019-093 Du 4 Juillet 2019 Portant Adoption De Lignes Directrices Relatives À L'application De L'article 82 De La Loi Du 6 Janvier 1978 Modifiée Aux Opérations De Lecture Et Écriture Dans Le Terminal D'un Utilisateur (Notamment Aux Cookies Et Autres Traceurs), CNIL. <a href="https://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000038778053&amp;dateTexte=&amp;categorieLien=id" rel="nofollow">https://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000038778053&amp;dateTexte=&amp;categorieLien=id</a></p>

<p>Opinion 5/2019 On The Interplay Between The Eprivacy Directive And The Gdpr, in particular regarding the competence, tasks and powers of data protection authorities, adopted on 12 March 2019, EDPB.<br>
<a href="https://edpb.europa.eu/sites/edpb/files/files/file1/201905_edpb_opinion_eprivacydir_gdpr_interplay_en_0.pdf" rel="nofollow">https://edpb.europa.eu/sites/edpb/files/files/file1/201905_edpb_opinion_eprivacydir_gdpr_interplay_en_0.pdf</a></p>

<p>Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>In the Fashion ID case, the European Court of Justice decides that website owners are now joint controllers with the provider of the third-party cookie, and that website owners are responsible for issuing the privacy notices for third party cookies and for collecting any consents that are required.  And, to make things a bit more complicated, the ECJ comes up with a new approach to analysing the data journey and who is the controller!  All this and more in this episode of GDPR Now!</p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p>Host<br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p>Materials<br>
You can try ADL Consulting’s "Introduction to Cyber Security" module for free here:<br>
<a href="https://adlconsulting.teachable.com/p/an-introduction-to-cyber-security" rel="nofollow">https://adlconsulting.teachable.com/p/an-introduction-to-cyber-security</a></p>

<p>Fashion ID<br>
ECJ Judgement:  <a href="http://curia.europa.eu/juris/document/document.jsf;jsessionid=CF6549B82743BAC9782DB7D41AD478DF?text=&amp;docid=216555&amp;pageIndex=0&amp;doclang=en&amp;mode=lst&amp;dir=&amp;occ=first&amp;part=1&amp;cid=14417748" rel="nofollow">http://curia.europa.eu/juris/document/document.jsf;jsessionid=CF6549B82743BAC9782DB7D41AD478DF?text=&amp;docid=216555&amp;pageIndex=0&amp;doclang=en&amp;mode=lst&amp;dir=&amp;occ=first&amp;part=1&amp;cid=14417748</a></p>

<p>Advocate General’s Opinion: <br>
<a href="http://curia.europa.eu/juris/document/document.jsf?text=&amp;docid=209357&amp;pageIndex=0&amp;doclang=en&amp;mode=lst&amp;dir=&amp;occ=first&amp;part=1&amp;cid=14418147" rel="nofollow">http://curia.europa.eu/juris/document/document.jsf?text=&amp;docid=209357&amp;pageIndex=0&amp;doclang=en&amp;mode=lst&amp;dir=&amp;occ=first&amp;part=1&amp;cid=14418147</a></p>

<p>Related documents<br>
Update Report Into Adtech And Real Time Bidding, ICO.  <a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/06/blog-ico-adtech-update-report-published-following-industry-engagement/" rel="nofollow">https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/06/blog-ico-adtech-update-report-published-following-industry-engagement/</a></p>

<p>Guidance On The Use Of Cookies And Similar Technologies, ICO.   <a href="https://ico.org.uk/for-organisations/guide-to-pecr/guidance-on-the-use-of-cookies-and-similar-technologies/" rel="nofollow">https://ico.org.uk/for-organisations/guide-to-pecr/guidance-on-the-use-of-cookies-and-similar-technologies/</a></p>

<p>Délibération N° 2019-093 Du 4 Juillet 2019 Portant Adoption De Lignes Directrices Relatives À L'application De L'article 82 De La Loi Du 6 Janvier 1978 Modifiée Aux Opérations De Lecture Et Écriture Dans Le Terminal D'un Utilisateur (Notamment Aux Cookies Et Autres Traceurs), CNIL. <a href="https://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000038778053&amp;dateTexte=&amp;categorieLien=id" rel="nofollow">https://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000038778053&amp;dateTexte=&amp;categorieLien=id</a></p>

<p>Opinion 5/2019 On The Interplay Between The Eprivacy Directive And The Gdpr, in particular regarding the competence, tasks and powers of data protection authorities, adopted on 12 March 2019, EDPB.<br>
<a href="https://edpb.europa.eu/sites/edpb/files/files/file1/201905_edpb_opinion_eprivacydir_gdpr_interplay_en_0.pdf" rel="nofollow">https://edpb.europa.eu/sites/edpb/files/files/file1/201905_edpb_opinion_eprivacydir_gdpr_interplay_en_0.pdf</a></p>

<p>Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>]]>
      </content:encoded>
      <pubDate>Tue, 17 Sep 2019 09:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/21a9c7de/be3621af.mp3" length="17714412" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/wxQuDdt08JDV9-FZHt30SHRTEAf29oxC4W74hmiyMm8/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyODYv/MTY3MzQ1MjIwMy1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1095</itunes:duration>
      <itunes:summary>In the Fashion ID case, the European Court of Justice decides that website owners are now joint controllers with the provider of the third-party cookie, and that website owners are responsible for issuing the privacy notices for third party cookies and for collecting any consents that are required.  And, to make things a bit more complicated, the ECJ comes up with a new approach to analysing the data journey and who is the controller!  All this and more in this episode of GDPR Now!

GDPR Now! Is brought to you by This Is DPO.
www.thisisdpo.co.uk.

Host
Mark Sherwood-Edwards 
info@thisisdpo.co.uk

Materials
You can try ADL Consulting’s "Introduction to Cyber Security" module for free here:
https://adlconsulting.teachable.com/p/an-introduction-to-cyber-security

Fashion ID
ECJ Judgement:  http://curia.europa.eu/juris/document/document.jsf;jsessionid=CF6549B82743BAC9782DB7D41AD478DF?text=&amp;amp;docid=216555&amp;amp;pageIndex=0&amp;amp;doclang=en&amp;amp;mode=lst&amp;amp;dir=&amp;amp;occ=first&amp;amp;part=1&amp;amp;cid=14417748

Advocate General’s Opinion: 
http://curia.europa.eu/juris/document/document.jsf?text=&amp;amp;docid=209357&amp;amp;pageIndex=0&amp;amp;doclang=en&amp;amp;mode=lst&amp;amp;dir=&amp;amp;occ=first&amp;amp;part=1&amp;amp;cid=14418147

Related documents
Update Report Into Adtech And Real Time Bidding, ICO.  https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/06/blog-ico-adtech-update-report-published-following-industry-engagement/

Guidance On The Use Of Cookies And Similar Technologies, ICO.   https://ico.org.uk/for-organisations/guide-to-pecr/guidance-on-the-use-of-cookies-and-similar-technologies/

Délibération N° 2019-093 Du 4 Juillet 2019 Portant Adoption De Lignes Directrices Relatives À L'application De L'article 82 De La Loi Du 6 Janvier 1978 Modifiée Aux Opérations De Lecture Et Écriture Dans Le Terminal D'un Utilisateur (Notamment Aux Cookies Et Autres Traceurs), CNIL. https://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000038778053&amp;amp;dateTexte=&amp;amp;categorieLien=id

Opinion 5/2019 On The Interplay Between The Eprivacy Directive And The Gdpr, in particular regarding the competence, tasks and powers of data protection authorities, adopted on 12 March 2019, EDPB.
https://edpb.europa.eu/sites/edpb/files/files/file1/201905_edpb_opinion_eprivacydir_gdpr_interplay_en_0.pdf

Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at info@thisisdpo.co.uk</itunes:summary>
      <itunes:subtitle>In the Fashion ID case, the European Court of Justice decides that website owners are now joint controllers with the provider of the third-party cookie, and that website owners are responsible for issuing the privacy notices for third party cookies and fo</itunes:subtitle>
      <itunes:keywords>gdpr, privacy, breach, data protection, cookie, FashionID</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 7: Cyber security - everything a DPO needs to know.  Part 1.</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>7</itunes:episode>
      <podcast:episode>7</podcast:episode>
      <itunes:title>Episode 7: Cyber security - everything a DPO needs to know.  Part 1.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f3bc4d84-b52f-410b-b4f3-76da3bf9f29f</guid>
      <link>https://share.transistor.fm/s/ce47c88d</link>
      <description>
        <![CDATA[<p><strong>Cyber security for DPOs.</strong></p>

<p>Cyber security isn’t usually the primary responsibility of the DPO, but you can’t be an effective DPO if you don’t understand the security regime in your organisation and the trade-offs behind them.  In this episode, we look at cyber security: what does it really consist of? how best to think about it? and what are the most common areas of vulnerability?</p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest/s</strong><br>
Andy Larkum<br>
CEO of ADL Consulting<br>
<a href="https://adlconsulting.co.uk" rel="nofollow">https://adlconsulting.co.uk</a><br>
<a href="mailto:andy@adlconsulting.co.uk" rel="nofollow">andy@adlconsulting.co.uk</a></p>

<p><strong>Host</strong><br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p><strong>Materials</strong></p>

<p><strong>Breaking News!</strong><br>
You can try ADL Consulting’s "Introduction to Cyber Security" module for free here:<br>
<a href="https://adlconsulting.teachable.com/p/an-introduction-to-cyber-security" rel="nofollow">https://adlconsulting.teachable.com/p/an-introduction-to-cyber-security</a></p>

<p>Cyber Essentials self-assessment questionnaire:<br>
<a href="https://adlconsulting.co.uk/getting-help-cyber-essentials" rel="nofollow">https://adlconsulting.co.uk/getting-help-cyber-essentials</a> - see heading "What's Involved"</p>

<p>ISO 27001<br>
<a href="https://adlconsulting.co.uk/iso27001-consultancy" rel="nofollow">https://adlconsulting.co.uk/iso27001-consultancy</a></p>

<p>Training:<br>
<a href="https://adlconsulting.co.uk/staff-training" rel="nofollow">https://adlconsulting.co.uk/staff-training</a><br>
<a href="https://adlconsulting.teachable.com" rel="nofollow">https://adlconsulting.teachable.com</a></p>

<p>Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p><p>Special Guest: Andy Larkum.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>Cyber security for DPOs.</strong></p>

<p>Cyber security isn’t usually the primary responsibility of the DPO, but you can’t be an effective DPO if you don’t understand the security regime in your organisation and the trade-offs behind them.  In this episode, we look at cyber security: what does it really consist of? how best to think about it? and what are the most common areas of vulnerability?</p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest/s</strong><br>
Andy Larkum<br>
CEO of ADL Consulting<br>
<a href="https://adlconsulting.co.uk" rel="nofollow">https://adlconsulting.co.uk</a><br>
<a href="mailto:andy@adlconsulting.co.uk" rel="nofollow">andy@adlconsulting.co.uk</a></p>

<p><strong>Host</strong><br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p><strong>Materials</strong></p>

<p><strong>Breaking News!</strong><br>
You can try ADL Consulting’s "Introduction to Cyber Security" module for free here:<br>
<a href="https://adlconsulting.teachable.com/p/an-introduction-to-cyber-security" rel="nofollow">https://adlconsulting.teachable.com/p/an-introduction-to-cyber-security</a></p>

<p>Cyber Essentials self-assessment questionnaire:<br>
<a href="https://adlconsulting.co.uk/getting-help-cyber-essentials" rel="nofollow">https://adlconsulting.co.uk/getting-help-cyber-essentials</a> - see heading "What's Involved"</p>

<p>ISO 27001<br>
<a href="https://adlconsulting.co.uk/iso27001-consultancy" rel="nofollow">https://adlconsulting.co.uk/iso27001-consultancy</a></p>

<p>Training:<br>
<a href="https://adlconsulting.co.uk/staff-training" rel="nofollow">https://adlconsulting.co.uk/staff-training</a><br>
<a href="https://adlconsulting.teachable.com" rel="nofollow">https://adlconsulting.teachable.com</a></p>

<p>Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p><p>Special Guest: Andy Larkum.</p>]]>
      </content:encoded>
      <pubDate>Tue, 27 Aug 2019 19:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/ce47c88d/114184ac.mp3" length="65100671" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/7dQ458NmdVtQ58H3uh8ggya_6U5l-i97411itYGKWRY/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyODUv/MTY3MzQ1MjIwMy1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>4057</itunes:duration>
      <itunes:summary>Cyber security for DPOs.

Cyber security isn’t usually the primary responsibility of the DPO, but you can’t be an effective DPO if you don’t understand the security regime in your organisation and the trade-offs behind them.  In this episode, we look at cyber security: what does it really consist of? how best to think about it? and what are the most common areas of vulnerability?

GDPR Now! Is brought to you by This Is DPO.
www.thisisdpo.co.uk.

Guest/s
Andy Larkum
CEO of ADL Consulting
https://adlconsulting.co.uk
andy@adlconsulting.co.uk

Host
Mark Sherwood-Edwards 
info@thisisdpo.co.uk

Materials

Breaking News!
You can try ADL Consulting’s "Introduction to Cyber Security" module for free here:
https://adlconsulting.teachable.com/p/an-introduction-to-cyber-security

Cyber Essentials self-assessment questionnaire:
https://adlconsulting.co.uk/getting-help-cyber-essentials - see heading "What's Involved"

ISO 27001
https://adlconsulting.co.uk/iso27001-consultancy

Training:
https://adlconsulting.co.uk/staff-training
https://adlconsulting.teachable.com

Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at info@thisisdpo.co.ukSpecial Guest: Andy Larkum.</itunes:summary>
      <itunes:subtitle>Cyber security for DPOs.

Cyber security isn’t usually the primary responsibility of the DPO, but you can’t be an effective DPO if you don’t understand the security regime in your organisation and the trade-offs behind them.  In this episode, we look at c</itunes:subtitle>
      <itunes:keywords>gdpr, privacy, breach, data protection, cyber, cybersecurity</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 6: Cyber insurance - everything you need to know</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>6</itunes:episode>
      <podcast:episode>6</podcast:episode>
      <itunes:title>Episode 6: Cyber insurance - everything you need to know</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">14961767-814a-4dfd-92ab-2cfba6d69a10</guid>
      <link>https://share.transistor.fm/s/9006cab7</link>
      <description>
        <![CDATA[<p><strong>About this episode.</strong><br>
Cyber insurance is key to managing data protection risks.  In this episode, we take a look at how cyber insurance works, what risks it covers, and how best to buy it.</p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest/s</strong><br>
Richard Spragg<br>
<a href="mailto:Richard.spragg@rfib.co.uk" rel="nofollow">Richard.spragg@rfib.co.uk</a><br>
<a href="http://www.rfib.co.uk" rel="nofollow">www.rfib.co.uk</a></p>

<p><strong>Host</strong><br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p><strong>Materials</strong><br>
2018 Cost of a Data Breach Study: Global Overview<br>
Ponemon Institute <br>
<a href="http://www.ibm.com/security/data-breach" rel="nofollow">www.ibm.com/security/data-breach</a></p>

<p>On breach and planning for breach, see also:<br>
<a href="https://thisisdpo.co.uk/2019/02/04/preparing-to-deal-with-a-data-breach-the-role-of-the-dpo/" rel="nofollow">https://thisisdpo.co.uk/2019/02/04/preparing-to-deal-with-a-data-breach-the-role-of-the-dpo/</a></p>

<p>Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p><p>Special Guest: Richard Spragg.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>About this episode.</strong><br>
Cyber insurance is key to managing data protection risks.  In this episode, we take a look at how cyber insurance works, what risks it covers, and how best to buy it.</p>

<p>GDPR Now! Is brought to you by This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a>.</p>

<p><strong>Guest/s</strong><br>
Richard Spragg<br>
<a href="mailto:Richard.spragg@rfib.co.uk" rel="nofollow">Richard.spragg@rfib.co.uk</a><br>
<a href="http://www.rfib.co.uk" rel="nofollow">www.rfib.co.uk</a></p>

<p><strong>Host</strong><br>
Mark Sherwood-Edwards <br>
<a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p>

<p><strong>Materials</strong><br>
2018 Cost of a Data Breach Study: Global Overview<br>
Ponemon Institute <br>
<a href="http://www.ibm.com/security/data-breach" rel="nofollow">www.ibm.com/security/data-breach</a></p>

<p>On breach and planning for breach, see also:<br>
<a href="https://thisisdpo.co.uk/2019/02/04/preparing-to-deal-with-a-data-breach-the-role-of-the-dpo/" rel="nofollow">https://thisisdpo.co.uk/2019/02/04/preparing-to-deal-with-a-data-breach-the-role-of-the-dpo/</a></p>

<p>Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a></p><p>Special Guest: Richard Spragg.</p>]]>
      </content:encoded>
      <pubDate>Thu, 15 Aug 2019 17:45:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/9006cab7/7f4b7856.mp3" length="28405980" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/jbXDrq8xR-Erig_XmD8EM675aqk37Z5x613cJBnosjg/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyODQv/MTY3MzQ1MjIwMC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2313</itunes:duration>
      <itunes:summary>About this episode.
Cyber insurance is key to managing data protection risks.  In this episode, we take a look at how cyber insurance works, what risks it covers, and how best to buy it.

GDPR Now! Is brought to you by This Is DPO.
www.thisisdpo.co.uk.

Guest/s
Richard Spragg
Richard.spragg@rfib.co.uk
www.rfib.co.uk

Host
Mark Sherwood-Edwards 
info@thisisdpo.co.uk

Materials
2018 Cost of a Data Breach Study: Global Overview
Ponemon Institute 
www.ibm.com/security/data-breach

On breach and planning for breach, see also:
https://thisisdpo.co.uk/2019/02/04/preparing-to-deal-with-a-data-breach-the-role-of-the-dpo/

Questions, suggestion for improvement, ideas for issues to be covered in future episodes, or if you would like to appear one of our podcasts, please contact us at info@thisisdpo.co.ukSpecial Guest: Richard Spragg.</itunes:summary>
      <itunes:subtitle>About this episode.
Cyber insurance is key to managing data protection risks.  In this episode, we take a look at how cyber insurance works, what risks it covers, and how best to buy it.

GDPR Now! Is brought to you by This Is DPO.
www.thisisdpo.co.uk.

G</itunes:subtitle>
      <itunes:keywords>gdpr, privacy, breach, data protection, cyber, cyberinsurance.</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 5: Cookies and the GDPR – ICO v CNIL</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>5</itunes:episode>
      <podcast:episode>5</podcast:episode>
      <itunes:title>Episode 5: Cookies and the GDPR – ICO v CNIL</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">eaa85f27-0521-4097-b678-2944fb05b92b</guid>
      <link>https://share.transistor.fm/s/639ee79a</link>
      <description>
        <![CDATA[<p><strong>GDPR Now! is brought to you by This is DPO, www,thisisdpo.co.uk.</strong></p>

<p>*<em>Cookies and the GDPR– ICO v CNIL. *</em></p>

<p><strong>About this episode:</strong><br>
Both the UK’s ICO and France’s CNIL have issued updated guidance on cookies.  You would have thought that this is all old stuff, but the ICO’s paper comes hot on its Adtech paper where it stated that the UK industry does not understand the rules around cookies, nor the interrelationship between cookies and the GDPR.  In this podcast, we take a look at the eprivacy directive and see to what extent it makes sense and can be reconciled with the GDPR.   There are some surprises as it turns out that the CNIL has invented a new legal type of cookie.  This podcast is essential listening for anyone who wants to use cookies, whether first party or third party.</p>

<p>Host: Mark Sherwood-Edwards of This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a><br>
Email: <a href="mailto:mse@thisisdpo.co.uk" rel="nofollow">mse@thisisdpo.co.uk</a><br>
Telephone: 07748 761972</p>

<p><strong>Material referred to:</strong></p>

<p>Here’s the important paragraph from the ICO’s Guidance on the use of cookies and similar technologies (bottom of page 46):</p>


<p>The ICO cannot exclude the possibility of formal action in any area. However, it is unlikely that priority for any formal action would be given to uses of cookies where there is a low level of intrusiveness and low risk of harm to individuals. The ICO will consider whether you can demonstrate that you have done everything you can to clearly inform users about the cookies in question and to provide them with clear details of how to make choices. For example, the ICO is unlikely to prioritise first party cookies used for analytics purposes where these have a low privacy risk, or those that merely support the accessibility of sites and services, for regulatory action.</p>


<p><em>Guidance on the use of cookies and similar technologies, ICO</em><br>
<a href="https://ico.org.uk/for-organisations/guide-to-pecr/guidance-on-the-use-of-cookies-and-similar-technologies/" rel="nofollow">https://ico.org.uk/for-organisations/guide-to-pecr/guidance-on-the-use-of-cookies-and-similar-technologies/</a></p>

<p><em>Délibération n° 2019-093 du 4 juillet 2019 portant adoption de lignes directrices relatives à l'application de l'article 82 de la loi du 6 janvier 1978 modifiée aux opérations de lecture et écriture dans le terminal d'un utilisateur (notamment aux cookies et autres traceurs), CNIL</em><br>
<a href="https://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000038778053&amp;dateTexte=&amp;categorieLien=id" rel="nofollow">https://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000038778053&amp;dateTexte=&amp;categorieLien=id</a></p>

<p><em>Opinion 5/2019 on the interplay between the ePrivacy Directive and the GDPR, in particular regarding the competence, tasks and powers of data protection authorities, adopted on 12 March 2019, EDPB.</em><br>
<a href="https://edpb.europa.eu/sites/edpb/files/files/file1/201905_edpb_opinion_eprivacydir_gdpr_interplay_en_0.pdf" rel="nofollow">https://edpb.europa.eu/sites/edpb/files/files/file1/201905_edpb_opinion_eprivacydir_gdpr_interplay_en_0.pdf</a></p>

<p><strong>Contact details</strong><br>
You can contact the show at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a>.<br>
If you have questions, comments, suggestions for topics, or would like to appear on the show, please contact us on the email above.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p><strong>GDPR Now! is brought to you by This is DPO, www,thisisdpo.co.uk.</strong></p>

<p>*<em>Cookies and the GDPR– ICO v CNIL. *</em></p>

<p><strong>About this episode:</strong><br>
Both the UK’s ICO and France’s CNIL have issued updated guidance on cookies.  You would have thought that this is all old stuff, but the ICO’s paper comes hot on its Adtech paper where it stated that the UK industry does not understand the rules around cookies, nor the interrelationship between cookies and the GDPR.  In this podcast, we take a look at the eprivacy directive and see to what extent it makes sense and can be reconciled with the GDPR.   There are some surprises as it turns out that the CNIL has invented a new legal type of cookie.  This podcast is essential listening for anyone who wants to use cookies, whether first party or third party.</p>

<p>Host: Mark Sherwood-Edwards of This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a><br>
Email: <a href="mailto:mse@thisisdpo.co.uk" rel="nofollow">mse@thisisdpo.co.uk</a><br>
Telephone: 07748 761972</p>

<p><strong>Material referred to:</strong></p>

<p>Here’s the important paragraph from the ICO’s Guidance on the use of cookies and similar technologies (bottom of page 46):</p>


<p>The ICO cannot exclude the possibility of formal action in any area. However, it is unlikely that priority for any formal action would be given to uses of cookies where there is a low level of intrusiveness and low risk of harm to individuals. The ICO will consider whether you can demonstrate that you have done everything you can to clearly inform users about the cookies in question and to provide them with clear details of how to make choices. For example, the ICO is unlikely to prioritise first party cookies used for analytics purposes where these have a low privacy risk, or those that merely support the accessibility of sites and services, for regulatory action.</p>


<p><em>Guidance on the use of cookies and similar technologies, ICO</em><br>
<a href="https://ico.org.uk/for-organisations/guide-to-pecr/guidance-on-the-use-of-cookies-and-similar-technologies/" rel="nofollow">https://ico.org.uk/for-organisations/guide-to-pecr/guidance-on-the-use-of-cookies-and-similar-technologies/</a></p>

<p><em>Délibération n° 2019-093 du 4 juillet 2019 portant adoption de lignes directrices relatives à l'application de l'article 82 de la loi du 6 janvier 1978 modifiée aux opérations de lecture et écriture dans le terminal d'un utilisateur (notamment aux cookies et autres traceurs), CNIL</em><br>
<a href="https://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000038778053&amp;dateTexte=&amp;categorieLien=id" rel="nofollow">https://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000038778053&amp;dateTexte=&amp;categorieLien=id</a></p>

<p><em>Opinion 5/2019 on the interplay between the ePrivacy Directive and the GDPR, in particular regarding the competence, tasks and powers of data protection authorities, adopted on 12 March 2019, EDPB.</em><br>
<a href="https://edpb.europa.eu/sites/edpb/files/files/file1/201905_edpb_opinion_eprivacydir_gdpr_interplay_en_0.pdf" rel="nofollow">https://edpb.europa.eu/sites/edpb/files/files/file1/201905_edpb_opinion_eprivacydir_gdpr_interplay_en_0.pdf</a></p>

<p><strong>Contact details</strong><br>
You can contact the show at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a>.<br>
If you have questions, comments, suggestions for topics, or would like to appear on the show, please contact us on the email above.</p>]]>
      </content:encoded>
      <pubDate>Mon, 05 Aug 2019 08:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/639ee79a/2efb6817.mp3" length="30033399" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/KSUrpI9hJANeCTAqJR8yjdVKAu8uCxJ23f2zn3hOC34/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyODMv/MTY3MzQ1MjE5MS1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1865</itunes:duration>
      <itunes:summary>GDPR Now! is brought to you by This is DPO, www,thisisdpo.co.uk.

*Cookies and the GDPR– ICO v CNIL. *

About this episode:
Both the UK’s ICO and France’s CNIL have issued updated guidance on cookies.  You would have thought that this is all old stuff, but the ICO’s paper comes hot on its Adtech paper where it stated that the UK industry does not understand the rules around cookies, nor the interrelationship between cookies and the GDPR.  In this podcast, we take a look at the eprivacy directive and see to what extent it makes sense and can be reconciled with the GDPR.   There are some surprises as it turns out that the CNIL has invented a new legal type of cookie.  This podcast is essential listening for anyone who wants to use cookies, whether first party or third party.

Host: Mark Sherwood-Edwards of This Is DPO.
www.thisisdpo.co.uk
Email: mse@thisisdpo.co.uk
Telephone: 07748 761972

Material referred to:

Here’s the important paragraph from the ICO’s Guidance on the use of cookies and similar technologies (bottom of page 46):


The ICO cannot exclude the possibility of formal action in any area. However, it is unlikely that priority for any formal action would be given to uses of cookies where there is a low level of intrusiveness and low risk of harm to individuals. The ICO will consider whether you can demonstrate that you have done everything you can to clearly inform users about the cookies in question and to provide them with clear details of how to make choices. For example, the ICO is unlikely to prioritise first party cookies used for analytics purposes where these have a low privacy risk, or those that merely support the accessibility of sites and services, for regulatory action.


Guidance on the use of cookies and similar technologies, ICO
https://ico.org.uk/for-organisations/guide-to-pecr/guidance-on-the-use-of-cookies-and-similar-technologies/

Délibération n° 2019-093 du 4 juillet 2019 portant adoption de lignes directrices relatives à l'application de l'article 82 de la loi du 6 janvier 1978 modifiée aux opérations de lecture et écriture dans le terminal d'un utilisateur (notamment aux cookies et autres traceurs), CNIL
https://www.legifrance.gouv.fr/affichTexte.do?cidTexte=JORFTEXT000038778053&amp;amp;dateTexte=&amp;amp;categorieLien=id

Opinion 5/2019 on the interplay between the ePrivacy Directive and the GDPR, in particular regarding the competence, tasks and powers of data protection authorities, adopted on 12 March 2019, EDPB.
https://edpb.europa.eu/sites/edpb/files/files/file1/201905_edpb_opinion_eprivacydir_gdpr_interplay_en_0.pdf

Contact details
You can contact the show at info@thisisdpo.co.uk.
If you have questions, comments, suggestions for topics, or would like to appear on the show, please contact us on the email above.</itunes:summary>
      <itunes:subtitle>GDPR Now! is brought to you by This is DPO, www,thisisdpo.co.uk.

*Cookies and the GDPR– ICO v CNIL. *

About this episode:
Both the UK’s ICO and France’s CNIL have issued updated guidance on cookies.  You would have thought that this is all old stuff, bu</itunes:subtitle>
      <itunes:keywords>marketing, gdpr, privacy, breach, data protection.</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 4: Disproportionate, intrusive and unfair – the ICO report on ad tech and real time bidding – Part 2.</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>4</itunes:episode>
      <podcast:episode>4</podcast:episode>
      <itunes:title>Episode 4: Disproportionate, intrusive and unfair – the ICO report on ad tech and real time bidding – Part 2.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">417933dc-11a8-4a9a-a86c-e2d9e121de69</guid>
      <link>https://share.transistor.fm/s/f0a5a6fa</link>
      <description>
        <![CDATA[<p>GDPR Now! brought to you by This is DPO.  <a href="http://www" rel="nofollow">www</a>. thisisdpo.co.uk</p>

<p>Disproportionate, intrusive and unfair – the ICO report on ad tech and real time bidding – Part 2.</p>

<p>This is part 2 of a two-parter.</p>

<p>About this episode:<br>
In its recent paper, Update report into adtech and real time bidding, the ICO has set out a biting criticism of how real time bidding (RTB) currently operates in the UK.  The phrase disproportionate, intrusive and unfair occurs three times, and intrusive on its own is used an additional three times.  The paper is not intended as formal guidance, but it gives a clear sense of direction.  The ICO also adds that the issues it raises in this paper are not the only concerns it has with programmatic advertising.<br>
Although the ICO has stated that it will take another six months to investigate further, it is already clear that the ICO will intervene.  The ICO’s paper, and its forthcoming intervention, are likely to have a substantial impact in the programmatic industry in the EU and the US.  It is no exaggeration to say that the ICO’s intervention is likely to have a bigger impact on this industry than the GDPR.  To give some idea of scale: the worldwide spend of on digital advertising is expected to reach US$98bn in 2020.  In Europe, the UK is by far the largest market, followed by Germany and then France (approx. US$15bn, US$8bn, US$4bn, respectively, in 2018).</p>

<p>In this episode, three luminaries from digital advertising get together to discuss the ICO’s report and the possible ways forward.</p>

<p>Guests:<br>
Andy Houston<br>
Product Director, Crimtan<br>
<a href="https://crimtan.com/" rel="nofollow">https://crimtan.com/</a><br>
<a href="mailto:ahoustoun@crimtan.com" rel="nofollow">ahoustoun@crimtan.com</a></p>

<p>Omar Oakes<br>
Global Technology Director, Campaign.<br>
<a href="https://www.campaignlive.co.uk/" rel="nofollow">https://www.campaignlive.co.uk/</a><br>
<a href="mailto:omar.oakes@haymarket.com" rel="nofollow">omar.oakes@haymarket.com</a></p>

<p>John Mitchison<br>
Director of Policy and Compliance<br>
Data &amp; Marketing Association<br>
<a href="http://www.dma.org.uk" rel="nofollow">http://www.dma.org.uk</a><br>
<a href="mailto:john.mitchison@dma.org.uk" rel="nofollow">john.mitchison@dma.org.uk</a></p>

<p>Host: Mark Sherwood-Edwards of This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a><br>
Email: <a href="mailto:mse@thisisdpo.co.uk" rel="nofollow">mse@thisisdpo.co.uk</a><br>
Telephone: 07748 761972</p>

<p>Material referred to:<br>
Update report into adtech and real time bidding, ICO. <br>
<a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/06/blog-ico-adtech-update-report-published-following-industry-engagement/" rel="nofollow">https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/06/blog-ico-adtech-update-report-published-following-industry-engagement/</a></p>

<p>Crimtan’s ActivID<br>
<a href="https://crimtan.com/activeid/" rel="nofollow">https://crimtan.com/activeid/</a></p>

<p>Contact details<br>
You can contact the show at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a>.<br>
If you have questions, comments, suggestions for topics, or would like to appear on the show, please contact us on the email above.</p><p>Special Guests: Andy Houston, John Mitchison, and Omar Oakes.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GDPR Now! brought to you by This is DPO.  <a href="http://www" rel="nofollow">www</a>. thisisdpo.co.uk</p>

<p>Disproportionate, intrusive and unfair – the ICO report on ad tech and real time bidding – Part 2.</p>

<p>This is part 2 of a two-parter.</p>

<p>About this episode:<br>
In its recent paper, Update report into adtech and real time bidding, the ICO has set out a biting criticism of how real time bidding (RTB) currently operates in the UK.  The phrase disproportionate, intrusive and unfair occurs three times, and intrusive on its own is used an additional three times.  The paper is not intended as formal guidance, but it gives a clear sense of direction.  The ICO also adds that the issues it raises in this paper are not the only concerns it has with programmatic advertising.<br>
Although the ICO has stated that it will take another six months to investigate further, it is already clear that the ICO will intervene.  The ICO’s paper, and its forthcoming intervention, are likely to have a substantial impact in the programmatic industry in the EU and the US.  It is no exaggeration to say that the ICO’s intervention is likely to have a bigger impact on this industry than the GDPR.  To give some idea of scale: the worldwide spend of on digital advertising is expected to reach US$98bn in 2020.  In Europe, the UK is by far the largest market, followed by Germany and then France (approx. US$15bn, US$8bn, US$4bn, respectively, in 2018).</p>

<p>In this episode, three luminaries from digital advertising get together to discuss the ICO’s report and the possible ways forward.</p>

<p>Guests:<br>
Andy Houston<br>
Product Director, Crimtan<br>
<a href="https://crimtan.com/" rel="nofollow">https://crimtan.com/</a><br>
<a href="mailto:ahoustoun@crimtan.com" rel="nofollow">ahoustoun@crimtan.com</a></p>

<p>Omar Oakes<br>
Global Technology Director, Campaign.<br>
<a href="https://www.campaignlive.co.uk/" rel="nofollow">https://www.campaignlive.co.uk/</a><br>
<a href="mailto:omar.oakes@haymarket.com" rel="nofollow">omar.oakes@haymarket.com</a></p>

<p>John Mitchison<br>
Director of Policy and Compliance<br>
Data &amp; Marketing Association<br>
<a href="http://www.dma.org.uk" rel="nofollow">http://www.dma.org.uk</a><br>
<a href="mailto:john.mitchison@dma.org.uk" rel="nofollow">john.mitchison@dma.org.uk</a></p>

<p>Host: Mark Sherwood-Edwards of This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a><br>
Email: <a href="mailto:mse@thisisdpo.co.uk" rel="nofollow">mse@thisisdpo.co.uk</a><br>
Telephone: 07748 761972</p>

<p>Material referred to:<br>
Update report into adtech and real time bidding, ICO. <br>
<a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/06/blog-ico-adtech-update-report-published-following-industry-engagement/" rel="nofollow">https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/06/blog-ico-adtech-update-report-published-following-industry-engagement/</a></p>

<p>Crimtan’s ActivID<br>
<a href="https://crimtan.com/activeid/" rel="nofollow">https://crimtan.com/activeid/</a></p>

<p>Contact details<br>
You can contact the show at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a>.<br>
If you have questions, comments, suggestions for topics, or would like to appear on the show, please contact us on the email above.</p><p>Special Guests: Andy Houston, John Mitchison, and Omar Oakes.</p>]]>
      </content:encoded>
      <pubDate>Mon, 22 Jul 2019 11:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/f0a5a6fa/a2d735a8.mp3" length="22593547" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/h6zMoDirz7yCEqE8WokL4K5XuxaIA8jARgGlScOTMqs/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyODIv/MTY3MzQ1MjE5NC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>1400</itunes:duration>
      <itunes:summary>GDPR Now! brought to you by This is DPO.  www. thisisdpo.co.uk

Disproportionate, intrusive and unfair – the ICO report on ad tech and real time bidding – Part 2.

This is part 2 of a two-parter.

About this episode:
In its recent paper, Update report into adtech and real time bidding, the ICO has set out a biting criticism of how real time bidding (RTB) currently operates in the UK.  The phrase disproportionate, intrusive and unfair occurs three times, and intrusive on its own is used an additional three times.  The paper is not intended as formal guidance, but it gives a clear sense of direction.  The ICO also adds that the issues it raises in this paper are not the only concerns it has with programmatic advertising.
Although the ICO has stated that it will take another six months to investigate further, it is already clear that the ICO will intervene.  The ICO’s paper, and its forthcoming intervention, are likely to have a substantial impact in the programmatic industry in the EU and the US.  It is no exaggeration to say that the ICO’s intervention is likely to have a bigger impact on this industry than the GDPR.  To give some idea of scale: the worldwide spend of on digital advertising is expected to reach US$98bn in 2020.  In Europe, the UK is by far the largest market, followed by Germany and then France (approx. US$15bn, US$8bn, US$4bn, respectively, in 2018).

In this episode, three luminaries from digital advertising get together to discuss the ICO’s report and the possible ways forward.

Guests:
Andy Houston
Product Director, Crimtan
https://crimtan.com/
ahoustoun@crimtan.com

Omar Oakes
Global Technology Director, Campaign.
https://www.campaignlive.co.uk/
omar.oakes@haymarket.com

John Mitchison
Director of Policy and Compliance
Data &amp;amp; Marketing Association
http://www.dma.org.uk
john.mitchison@dma.org.uk

Host: Mark Sherwood-Edwards of This Is DPO.
www.thisisdpo.co.uk
Email: mse@thisisdpo.co.uk
Telephone: 07748 761972

Material referred to:
Update report into adtech and real time bidding, ICO. 
https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/06/blog-ico-adtech-update-report-published-following-industry-engagement/

Crimtan’s ActivID
https://crimtan.com/activeid/

Contact details
You can contact the show at info@thisisdpo.co.uk.
If you have questions, comments, suggestions for topics, or would like to appear on the show, please contact us on the email above.Special Guests: Andy Houston, John Mitchison, and Omar Oakes.</itunes:summary>
      <itunes:subtitle>GDPR Now! brought to you by This is DPO.  www. thisisdpo.co.uk

Disproportionate, intrusive and unfair – the ICO report on ad tech and real time bidding – Part 2.

This is part 2 of a two-parter.

About this episode:
In its recent paper, Update report int</itunes:subtitle>
      <itunes:keywords>privacy, marketing, gdpr, rgpd, breach, data protection, ICO, real time bidding, RTB, ad tech,  adtech, consent, legitimate interest, personal data, cookie, e-privacy, PECR, privacylaw, gdprcompliance, compliance, advertising, digitaladvertising</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 3: Disproportionate, intrusive and unfair – the ICO reports on ad tech and real time bidding (Part 1).</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>3</itunes:episode>
      <podcast:episode>3</podcast:episode>
      <itunes:title>Episode 3: Disproportionate, intrusive and unfair – the ICO reports on ad tech and real time bidding (Part 1).</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">1757b9a0-c5ad-4968-9cd4-0b4170c10562</guid>
      <link>https://share.transistor.fm/s/782ed5f7</link>
      <description>
        <![CDATA[<p>GDPR Now! brought to you by This is DPO.</p>

<p>Disproportionate, intrusive and unfair – the ICO report on ad tech and real time bidding (Part 1).<br>
This episode is  Part 1 of two parts.</p>

<p>About this episode:<br>
In its recent paper, Update report into adtech and real time bidding, the ICO has set out a biting criticism of how real time bidding (RTB) currently operates in the UK.  The phrase <em>disproportionate, intrusive and unfair</em> occurs three times, and <em>intrusive</em> on its own is used an additional three times.  The paper is not intended as formal guidance, but it gives a clear sense of direction.  The ICO also adds that the issues it raises in this paper are not the only concerns it has with programmatic advertising.</p>

<p>Although the ICO has stated that it will take another six months to investigate further, it is already clear that the ICO will intervene.  The ICO’s paper, and its forthcoming intervention, are likely to have a substantial impact in the programmatic industry in the EU and the US.  It is no exaggeration to say that the ICO’s intervention is likely to have a bigger impact on this industry than the GDPR.  To give some idea of scale: the worldwide spend of on digital advertising is expected to reach US$98bn in 2020.  In Europe, the UK is by far the largest market, followed by Germany and then France (approx. US$15bn, US$8bn, US$4bn, respectively, in 2018).</p>

<p>In this episode, three luminaries from digital advertising get together to discuss the ICO’s report and the possible ways forward.</p>

<p>Guests:</p>

<p>Andy Houston<br>
Product Director, Crimtan<br>
<a href="https://crimtan.com/" rel="nofollow">https://crimtan.com/</a><br>
<a href="mailto:ahoustoun@crimtan.com" rel="nofollow">ahoustoun@crimtan.com</a></p>

<p>Omar Oakes<br>
Global Technology Director, Campaign.<br>
<a href="https://www.campaignlive.co.uk/" rel="nofollow">https://www.campaignlive.co.uk/</a><br>
<a href="mailto:omar.oakes@haymarket.com" rel="nofollow">omar.oakes@haymarket.com</a></p>

<p>John Mitchison<br>
Director of Policy and Compliance<br>
Data &amp; Marketing Association<br>
<a href="http://www.dma.org.uk" rel="nofollow">http://www.dma.org.uk</a><br>
<a href="mailto:john.mitchison@dma.org.uk" rel="nofollow">john.mitchison@dma.org.uk</a></p>

<p>Host: Mark Sherwood-Edwards of This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a><br>
Email: <a href="mailto:mse@thisisdpo.co.uk" rel="nofollow">mse@thisisdpo.co.uk</a><br>
Telephone: 07748 761972</p>

<p>Material referred to:</p>

<p>Update report into adtech and real time bidding, ICO. <br>
<a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/06/blog-ico-adtech-update-report-published-following-industry-engagement/" rel="nofollow">https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/06/blog-ico-adtech-update-report-published-following-industry-engagement/</a></p>

<p>Crimtan’s ActivID<br>
<a href="https://crimtan.com/activeid/" rel="nofollow">https://crimtan.com/activeid/</a></p>

<p>Contact details</p>

<p>You can contact the show at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a>.<br>
If you have questions, comments, suggestions for topics, or would like to appear on the show, please contact us on the email above.</p><p>Special Guests: Andy Houston, John Mitchison, and Omar Oakes.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GDPR Now! brought to you by This is DPO.</p>

<p>Disproportionate, intrusive and unfair – the ICO report on ad tech and real time bidding (Part 1).<br>
This episode is  Part 1 of two parts.</p>

<p>About this episode:<br>
In its recent paper, Update report into adtech and real time bidding, the ICO has set out a biting criticism of how real time bidding (RTB) currently operates in the UK.  The phrase <em>disproportionate, intrusive and unfair</em> occurs three times, and <em>intrusive</em> on its own is used an additional three times.  The paper is not intended as formal guidance, but it gives a clear sense of direction.  The ICO also adds that the issues it raises in this paper are not the only concerns it has with programmatic advertising.</p>

<p>Although the ICO has stated that it will take another six months to investigate further, it is already clear that the ICO will intervene.  The ICO’s paper, and its forthcoming intervention, are likely to have a substantial impact in the programmatic industry in the EU and the US.  It is no exaggeration to say that the ICO’s intervention is likely to have a bigger impact on this industry than the GDPR.  To give some idea of scale: the worldwide spend of on digital advertising is expected to reach US$98bn in 2020.  In Europe, the UK is by far the largest market, followed by Germany and then France (approx. US$15bn, US$8bn, US$4bn, respectively, in 2018).</p>

<p>In this episode, three luminaries from digital advertising get together to discuss the ICO’s report and the possible ways forward.</p>

<p>Guests:</p>

<p>Andy Houston<br>
Product Director, Crimtan<br>
<a href="https://crimtan.com/" rel="nofollow">https://crimtan.com/</a><br>
<a href="mailto:ahoustoun@crimtan.com" rel="nofollow">ahoustoun@crimtan.com</a></p>

<p>Omar Oakes<br>
Global Technology Director, Campaign.<br>
<a href="https://www.campaignlive.co.uk/" rel="nofollow">https://www.campaignlive.co.uk/</a><br>
<a href="mailto:omar.oakes@haymarket.com" rel="nofollow">omar.oakes@haymarket.com</a></p>

<p>John Mitchison<br>
Director of Policy and Compliance<br>
Data &amp; Marketing Association<br>
<a href="http://www.dma.org.uk" rel="nofollow">http://www.dma.org.uk</a><br>
<a href="mailto:john.mitchison@dma.org.uk" rel="nofollow">john.mitchison@dma.org.uk</a></p>

<p>Host: Mark Sherwood-Edwards of This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a><br>
Email: <a href="mailto:mse@thisisdpo.co.uk" rel="nofollow">mse@thisisdpo.co.uk</a><br>
Telephone: 07748 761972</p>

<p>Material referred to:</p>

<p>Update report into adtech and real time bidding, ICO. <br>
<a href="https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/06/blog-ico-adtech-update-report-published-following-industry-engagement/" rel="nofollow">https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/06/blog-ico-adtech-update-report-published-following-industry-engagement/</a></p>

<p>Crimtan’s ActivID<br>
<a href="https://crimtan.com/activeid/" rel="nofollow">https://crimtan.com/activeid/</a></p>

<p>Contact details</p>

<p>You can contact the show at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a>.<br>
If you have questions, comments, suggestions for topics, or would like to appear on the show, please contact us on the email above.</p><p>Special Guests: Andy Houston, John Mitchison, and Omar Oakes.</p>]]>
      </content:encoded>
      <pubDate>Sun, 21 Jul 2019 08:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/782ed5f7/bae61267.mp3" length="43040479" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/HAYooZj2b9VS0nwidSWWykZ26ZcvxeB95kcTHI5mhHA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyODEv/MTY3MzQ1MjE5Mi1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2678</itunes:duration>
      <itunes:summary>GDPR Now! brought to you by This is DPO.

Disproportionate, intrusive and unfair – the ICO report on ad tech and real time bidding (Part 1).
This episode is  Part 1 of two parts.

About this episode:
In its recent paper, Update report into adtech and real time bidding, the ICO has set out a biting criticism of how real time bidding (RTB) currently operates in the UK.  The phrase disproportionate, intrusive and unfair occurs three times, and intrusive on its own is used an additional three times.  The paper is not intended as formal guidance, but it gives a clear sense of direction.  The ICO also adds that the issues it raises in this paper are not the only concerns it has with programmatic advertising.

Although the ICO has stated that it will take another six months to investigate further, it is already clear that the ICO will intervene.  The ICO’s paper, and its forthcoming intervention, are likely to have a substantial impact in the programmatic industry in the EU and the US.  It is no exaggeration to say that the ICO’s intervention is likely to have a bigger impact on this industry than the GDPR.  To give some idea of scale: the worldwide spend of on digital advertising is expected to reach US$98bn in 2020.  In Europe, the UK is by far the largest market, followed by Germany and then France (approx. US$15bn, US$8bn, US$4bn, respectively, in 2018).

In this episode, three luminaries from digital advertising get together to discuss the ICO’s report and the possible ways forward.

Guests:

Andy Houston
Product Director, Crimtan
https://crimtan.com/
ahoustoun@crimtan.com

Omar Oakes
Global Technology Director, Campaign.
https://www.campaignlive.co.uk/
omar.oakes@haymarket.com

John Mitchison
Director of Policy and Compliance
Data &amp;amp; Marketing Association
http://www.dma.org.uk
john.mitchison@dma.org.uk

Host: Mark Sherwood-Edwards of This Is DPO.
www.thisisdpo.co.uk
Email: mse@thisisdpo.co.uk
Telephone: 07748 761972

Material referred to:

Update report into adtech and real time bidding, ICO. 
https://ico.org.uk/about-the-ico/news-and-events/news-and-blogs/2019/06/blog-ico-adtech-update-report-published-following-industry-engagement/

Crimtan’s ActivID
https://crimtan.com/activeid/

Contact details

You can contact the show at info@thisisdpo.co.uk.
If you have questions, comments, suggestions for topics, or would like to appear on the show, please contact us on the email above.Special Guests: Andy Houston, John Mitchison, and Omar Oakes.</itunes:summary>
      <itunes:subtitle>GDPR Now! brought to you by This is DPO.

Disproportionate, intrusive and unfair – the ICO report on ad tech and real time bidding (Part 1).
This episode is  Part 1 of two parts.

About this episode:
In its recent paper, Update report into adtech and real</itunes:subtitle>
      <itunes:keywords>marketing, gdpr, privacy, breach, data protection, rgpd, privacy, ICO, real time bidding, RTB, ad tech,  adtech, consent, legitimate interest, personal data, cookie, e-privacy, PECR</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 2: Subject access requests, personal data and the case of Rudd v Bridle with Ashley Winton and Laura Scaife.</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>2</itunes:episode>
      <podcast:episode>2</podcast:episode>
      <itunes:title>Episode 2: Subject access requests, personal data and the case of Rudd v Bridle with Ashley Winton and Laura Scaife.</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">f8eb6b80-bf6a-4d59-98a0-110aa2537e49</guid>
      <link>https://share.transistor.fm/s/4306b040</link>
      <description>
        <![CDATA[<p>GDPR Now! brought to you by This is DPO.</p>

<p>Subject access requests, personal data and the case of Rudd v Bridle with Ashley Winton and Laura Scaife. </p>

<p>About this episode:<br>
Dr Rudd served a subject access request on Mr Bridle, and was not satisfied with the information he received back.  Amongst allegations of fraud and conspiracy, the issue went to court.  Who was the controller, and did the journalism and regulatory exemptions apply?  One of the key issues was – what is personal data?  The judge reached a conclusion, but was he right?</p>

<p>Guests:<br>
Ashley Winton, McDermott, Will &amp; Emery<br>
London: +44 20 7577 6939<br>
<a href="https://www.mwe.com/people/winton-ashley/" rel="nofollow">https://www.mwe.com/people/winton-ashley/</a></p>

<p>Dr. Laura Scaife, McDermott, Will &amp; Emery<br>
London: +44 20 7577 6934<br>
<a href="https://www.mwe.com/people/dr-laura-scaife/" rel="nofollow">https://www.mwe.com/people/dr-laura-scaife/</a><br>
<a href="http://www.privacypractice.co.uk/" rel="nofollow">http://www.privacypractice.co.uk/</a></p>

<p>Host: Mark Sherwood-Edwards of This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a><br>
Email: <a href="mailto:mse@thisisdpo.co.uk" rel="nofollow">mse@thisisdpo.co.uk</a><br>
Telephone: 07748 761972</p>

<p>Material referred to:<br>
Rudd v Bridle <a href="https://www.bailii.org/ew/cases/EWHC/QB/2019/893.html" rel="nofollow">https://www.bailii.org/ew/cases/EWHC/QB/2019/893.html</a>.</p>

<p>For a written analysis of the case: <a href="https://thisisdpo.co.uk/2019/07/12/durant-rides-again-subject-access-requests-and-personal-data-revisited-in-rudd-v-bridle/" rel="nofollow">https://thisisdpo.co.uk/2019/07/12/durant-rides-again-subject-access-requests-and-personal-data-revisited-in-rudd-v-bridle/</a></p>

<p>Contact details<br>
You can contact the show at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a>.<br>
If you have questions, comments, suggestions for topics, or would like to appear on the show, please contact us on the email above.</p><p>Special Guests: Ashley Winton and Laura Scaife.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GDPR Now! brought to you by This is DPO.</p>

<p>Subject access requests, personal data and the case of Rudd v Bridle with Ashley Winton and Laura Scaife. </p>

<p>About this episode:<br>
Dr Rudd served a subject access request on Mr Bridle, and was not satisfied with the information he received back.  Amongst allegations of fraud and conspiracy, the issue went to court.  Who was the controller, and did the journalism and regulatory exemptions apply?  One of the key issues was – what is personal data?  The judge reached a conclusion, but was he right?</p>

<p>Guests:<br>
Ashley Winton, McDermott, Will &amp; Emery<br>
London: +44 20 7577 6939<br>
<a href="https://www.mwe.com/people/winton-ashley/" rel="nofollow">https://www.mwe.com/people/winton-ashley/</a></p>

<p>Dr. Laura Scaife, McDermott, Will &amp; Emery<br>
London: +44 20 7577 6934<br>
<a href="https://www.mwe.com/people/dr-laura-scaife/" rel="nofollow">https://www.mwe.com/people/dr-laura-scaife/</a><br>
<a href="http://www.privacypractice.co.uk/" rel="nofollow">http://www.privacypractice.co.uk/</a></p>

<p>Host: Mark Sherwood-Edwards of This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a><br>
Email: <a href="mailto:mse@thisisdpo.co.uk" rel="nofollow">mse@thisisdpo.co.uk</a><br>
Telephone: 07748 761972</p>

<p>Material referred to:<br>
Rudd v Bridle <a href="https://www.bailii.org/ew/cases/EWHC/QB/2019/893.html" rel="nofollow">https://www.bailii.org/ew/cases/EWHC/QB/2019/893.html</a>.</p>

<p>For a written analysis of the case: <a href="https://thisisdpo.co.uk/2019/07/12/durant-rides-again-subject-access-requests-and-personal-data-revisited-in-rudd-v-bridle/" rel="nofollow">https://thisisdpo.co.uk/2019/07/12/durant-rides-again-subject-access-requests-and-personal-data-revisited-in-rudd-v-bridle/</a></p>

<p>Contact details<br>
You can contact the show at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a>.<br>
If you have questions, comments, suggestions for topics, or would like to appear on the show, please contact us on the email above.</p><p>Special Guests: Ashley Winton and Laura Scaife.</p>]]>
      </content:encoded>
      <pubDate>Fri, 12 Jul 2019 16:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/4306b040/acc3f271.mp3" length="51895752" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/Ry0p2H2RR4OQJmK__hJNPOUzFgpEddVboMoBOqiWWlA/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyODAv/MTY3MzQ1MjE5Ni1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>3232</itunes:duration>
      <itunes:summary>GDPR Now! brought to you by This is DPO.

Subject access requests, personal data and the case of Rudd v Bridle with Ashley Winton and Laura Scaife. 

About this episode:
Dr Rudd served a subject access request on Mr Bridle, and was not satisfied with the information he received back.  Amongst allegations of fraud and conspiracy, the issue went to court.  Who was the controller, and did the journalism and regulatory exemptions apply?  One of the key issues was – what is personal data?  The judge reached a conclusion, but was he right?

Guests:
Ashley Winton, McDermott, Will &amp;amp; Emery
London: +44 20 7577 6939
https://www.mwe.com/people/winton-ashley/

Dr. Laura Scaife, McDermott, Will &amp;amp; Emery
London: +44 20 7577 6934
https://www.mwe.com/people/dr-laura-scaife/
http://www.privacypractice.co.uk/

Host: Mark Sherwood-Edwards of This Is DPO.
www.thisisdpo.co.uk
Email: mse@thisisdpo.co.uk
Telephone: 07748 761972

Material referred to:
Rudd v Bridle https://www.bailii.org/ew/cases/EWHC/QB/2019/893.html.

For a written analysis of the case: https://thisisdpo.co.uk/2019/07/12/durant-rides-again-subject-access-requests-and-personal-data-revisited-in-rudd-v-bridle/

Contact details
You can contact the show at info@thisisdpo.co.uk.
If you have questions, comments, suggestions for topics, or would like to appear on the show, please contact us on the email above.Special Guests: Ashley Winton and Laura Scaife.</itunes:summary>
      <itunes:subtitle>GDPR Now! brought to you by This is DPO.

Subject access requests, personal data and the case of Rudd v Bridle with Ashley Winton and Laura Scaife. 

About this episode:
Dr Rudd served a subject access request on Mr Bridle, and was not satisfied with the </itunes:subtitle>
      <itunes:keywords>gdpr, privacy, breach, data protection, personal data, subject access request, SAR, journalism</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
    <item>
      <title>Episode 1: GDPR One Year On - with James Leaton Gray</title>
      <itunes:season>1</itunes:season>
      <podcast:season>1</podcast:season>
      <itunes:episode>1</itunes:episode>
      <podcast:episode>1</podcast:episode>
      <itunes:title>Episode 1: GDPR One Year On - with James Leaton Gray</itunes:title>
      <itunes:episodeType>full</itunes:episodeType>
      <guid isPermaLink="false">b3b1c98b-29ad-4e90-a2c1-69c3a9853ce0</guid>
      <link>https://share.transistor.fm/s/0e3d1f15</link>
      <description>
        <![CDATA[<p>GDPR Now! brought to you by This is DPO.</p>

<p>Episode 1 – GDPR One Year On.  </p>

<p>About this episode:<br>
One year on, what’s GDPR looking like inside most companies.  Is an ongoing thing, or is privacy a one-off? What’s the most effective form of governance, and what’s the role of DPOs in that mix? Plus lots of related issues.</p>

<p>Guest: James Leaton Gray, Director of The Privacy Practice.<br>
<a href="http://www.privacypractice.co.uk/" rel="nofollow">http://www.privacypractice.co.uk/</a><br>
Email: <a href="mailto:jlg@leatongray.com" rel="nofollow">jlg@leatongray.com</a><br>
Telephone: +44 7740 818036</p>

<p>Host: Mark Sherwood-Edwards of This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a><br>
Email: <a href="mailto:mse@thisisdpo.co.uk" rel="nofollow">mse@thisisdpo.co.uk</a><br>
Telephone: +44 7748 761972</p>

<p>Material referred to:</p>

<p>Tim Berners Lee’s company<br>
<a href="http://www.inrupt.com" rel="nofollow">www.inrupt.com</a><br>
<a href="https://www.wired.co.uk/article/inrupt-tim-berners-lee" rel="nofollow">https://www.wired.co.uk/article/inrupt-tim-berners-lee</a></p>

<p>The Furman report<br>
The Economic Value of Data: Discussion Paper, HM Treasury, August 2018, and Unlocking Digital Competition: Report of the Digital Competition Expert Panel March 2019.<br>
<a href="https://www.gov.uk/government/publications/unlocking-digital-competition-report-of-the-digital-competition-expert-panel" rel="nofollow">https://www.gov.uk/government/publications/unlocking-digital-competition-report-of-the-digital-competition-expert-panel</a></p>

<p>Contact details<br>
You can contact the show at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a>.<br>
If you have questions, comments, suggestions for topics, or would like to appear on the show, please contact us on the email above.</p>]]>
      </description>
      <content:encoded>
        <![CDATA[<p>GDPR Now! brought to you by This is DPO.</p>

<p>Episode 1 – GDPR One Year On.  </p>

<p>About this episode:<br>
One year on, what’s GDPR looking like inside most companies.  Is an ongoing thing, or is privacy a one-off? What’s the most effective form of governance, and what’s the role of DPOs in that mix? Plus lots of related issues.</p>

<p>Guest: James Leaton Gray, Director of The Privacy Practice.<br>
<a href="http://www.privacypractice.co.uk/" rel="nofollow">http://www.privacypractice.co.uk/</a><br>
Email: <a href="mailto:jlg@leatongray.com" rel="nofollow">jlg@leatongray.com</a><br>
Telephone: +44 7740 818036</p>

<p>Host: Mark Sherwood-Edwards of This Is DPO.<br>
<a href="http://www.thisisdpo.co.uk" rel="nofollow">www.thisisdpo.co.uk</a><br>
Email: <a href="mailto:mse@thisisdpo.co.uk" rel="nofollow">mse@thisisdpo.co.uk</a><br>
Telephone: +44 7748 761972</p>

<p>Material referred to:</p>

<p>Tim Berners Lee’s company<br>
<a href="http://www.inrupt.com" rel="nofollow">www.inrupt.com</a><br>
<a href="https://www.wired.co.uk/article/inrupt-tim-berners-lee" rel="nofollow">https://www.wired.co.uk/article/inrupt-tim-berners-lee</a></p>

<p>The Furman report<br>
The Economic Value of Data: Discussion Paper, HM Treasury, August 2018, and Unlocking Digital Competition: Report of the Digital Competition Expert Panel March 2019.<br>
<a href="https://www.gov.uk/government/publications/unlocking-digital-competition-report-of-the-digital-competition-expert-panel" rel="nofollow">https://www.gov.uk/government/publications/unlocking-digital-competition-report-of-the-digital-competition-expert-panel</a></p>

<p>Contact details<br>
You can contact the show at <a href="mailto:info@thisisdpo.co.uk" rel="nofollow">info@thisisdpo.co.uk</a>.<br>
If you have questions, comments, suggestions for topics, or would like to appear on the show, please contact us on the email above.</p>]]>
      </content:encoded>
      <pubDate>Mon, 24 Jun 2019 13:00:00 +0000</pubDate>
      <author>Karen Heaton/Data Protection 4 Business</author>
      <enclosure url="https://media.transistor.fm/0e3d1f15/9f759a3e.mp3" length="43256303" type="audio/mpeg"/>
      <itunes:author>Karen Heaton/Data Protection 4 Business</itunes:author>
      <itunes:image href="https://img.transistor.fm/ySzqdmzwqqZeqwuGkN_0R3BkGWUB2ApaBHFWjiY2-yc/rs:fill:0:0:1/w:1400/h:1400/q:60/mb:500000/aHR0cHM6Ly9pbWct/dXBsb2FkLXByb2R1/Y3Rpb24udHJhbnNp/c3Rvci5mbS9lcGlz/b2RlLzExNjQyNzkv/MTY3MzQ1MjIwMC1h/cnR3b3JrLmpwZw.jpg"/>
      <itunes:duration>2692</itunes:duration>
      <itunes:summary>GDPR Now! brought to you by This is DPO.

Episode 1 – GDPR One Year On.  

About this episode:
One year on, what’s GDPR looking like inside most companies.  Is an ongoing thing, or is privacy a one-off? What’s the most effective form of governance, and what’s the role of DPOs in that mix? Plus lots of related issues.

Guest: James Leaton Gray, Director of The Privacy Practice.
http://www.privacypractice.co.uk/
Email: jlg@leatongray.com
Telephone: +44 7740 818036

Host: Mark Sherwood-Edwards of This Is DPO.
www.thisisdpo.co.uk
Email: mse@thisisdpo.co.uk
Telephone: +44 7748 761972

Material referred to:

Tim Berners Lee’s company
www.inrupt.com
https://www.wired.co.uk/article/inrupt-tim-berners-lee

The Furman report
The Economic Value of Data: Discussion Paper, HM Treasury, August 2018, and Unlocking Digital Competition: Report of the Digital Competition Expert Panel March 2019.
https://www.gov.uk/government/publications/unlocking-digital-competition-report-of-the-digital-competition-expert-panel

Contact details
You can contact the show at info@thisisdpo.co.uk.
If you have questions, comments, suggestions for topics, or would like to appear on the show, please contact us on the email above.</itunes:summary>
      <itunes:subtitle>GDPR Now! brought to you by This is DPO.

Episode 1 – GDPR One Year On.  

About this episode:
One year on, what’s GDPR looking like inside most companies.  Is an ongoing thing, or is privacy a one-off? What’s the most effective form of governance, and wh</itunes:subtitle>
      <itunes:keywords>gdpr, privacy, breach, data protection,</itunes:keywords>
      <itunes:explicit>No</itunes:explicit>
    </item>
  </channel>
</rss>
