Все публикации

Privacy Notice Generator - how to use the tool

Director of Enforcement and Investigations role - Q&A with Stephen Bonner

Link to the full and updated version of the Q&A with Stephen Bonner in the description.

Your Data Matters - #BeDataAware

Simple steps to protect your information from cyber criminals - two-step verification

Simple steps to protect your information from cyber criminals - strong passwords.

Come with us to see The Commissioner deliver a speech at Tech UK's Digital Ethics Summit about AI!

What is scarier, this ghostly CCTV footage or CCTV that isn’t compliant with data protection law?!

Two minutes on: data protection and telephone marketing

Two minutes on the soft opt-in for email and text marketing campaigns

Two minutes on: direct marketing and data protection

UX design and Data Protection series: How can we design online products for safety?

UX design and Data Protection series: We need to ditch deceptive design

Privacy and UX design series: Why is privacy is a product issue?

UX design and data protection series: What does privacy look like in the real world of tech?

Reporting data breaches

ICO's FOI Training: What does a valid FOI request look like and what should I do?

ICO's FOI Training: What's the ICO's role under FOI and EIR?

ICO's FOI Training: What do I do if there's personal data in a request?

ICO's FOI Training: What are the Freedom of Information Act exemptions?

ICO's FOI Training: Understanding the less common personal data provisions

ICO's FOI Training: What is the Freedom of Information Act?

ICO's FOI Training: How do I know if a request is vexatious or manifestly unreasonable?

ICO's FOI Training: What are the EIR exceptions and how do I apply the public interest test?