by Syndicated News Feed | Aug 15, 2025 | Data Protection
Use case and large-scale processing, including of sensitive data, are not justified as necessary and proportionateWe found that the Home Office had seemingly failed to carry out necessity and proportionality assessments for either tool, examining whether the...
by Syndicated News Feed | Aug 14, 2025 | Data Protection
SOC (System and Organization Controls) audits provide an independent assessment of the risks associated with using service organisations and other third parties. SOC 2 audits assess service organisations’ security, availability, processing integrity, confidentiality...
by Syndicated News Feed | Aug 14, 2025 | Data Protection
Introduction In June 2025, the Department of Telecommunications released the Draft Telecommunications (Telecom Cyber Security) Amendment Rules, 2025. These proposed amendments aim to introduce a centralised framework to validate mobile numbers as part of a larger...
by Syndicated News Feed | Aug 13, 2025 | Data Protection
For local authority investigators, interviewing is at the heart of effective casework. Interviews aren’t just fact finding conversations; they are a formal investigative tool with legal significance. The way you conduct them can determine whether your evidence stands...
by Syndicated News Feed | Aug 13, 2025 | Data Protection
Introduction The Indian Computer Emergency Response Team, CERT-In, under the aegis of the Ministry of Electronics and Information Technology (MeitY), has issued guidelines titled the “Comprehensive Cyber Security Audit Policy Guidelines.” This aligns with India’s...