<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Services Archives - L2 Cyber Security Solutions Ltd.</title>
	<atom:link href="https://www.l2cybersecurity.com/category/services/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.l2cybersecurity.com/category/services/</link>
	<description>#SecuritySimplified</description>
	<lastBuildDate>Mon, 23 Feb 2026 17:04:47 +0000</lastBuildDate>
	<language>en-GB</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	

<image>
	<url>https://www.l2cybersecurity.com/wp-content/uploads/2023/03/cropped-Logo-Only-Favicon-Transparent-32x32.png</url>
	<title>Services Archives - L2 Cyber Security Solutions Ltd.</title>
	<link>https://www.l2cybersecurity.com/category/services/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Cyber Security for Charities</title>
		<link>https://www.l2cybersecurity.com/cyber-security-for-charities/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 10 May 2023 20:49:56 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Charities]]></category>
		<category><![CDATA[Charity]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Cyber Security for Charities]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity for Charities]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2772</guid>

					<description><![CDATA[<p>In today&#8217;s digital landscape, charities face increasing cyber threats that can compromise sensitive data and damage their reputation. Safeguarding your organisation&#8217;s information is crucial to maintaining trust and ensuring the continuity of your charitable work. By implementing simple cyber security measures, you can significantly enhance your defences. In this post, I will explore valuable tips&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-for-charities/">Cyber Security for Charities</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In today&#8217;s digital landscape, charities face increasing cyber threats that can compromise sensitive data and damage their reputation. Safeguarding your organisation&#8217;s information is crucial to maintaining trust and ensuring the continuity of your charitable work. <span id="more-2772"></span>By implementing simple cyber security measures, you can significantly enhance your defences. In this post, I will explore valuable tips to help your cyber security for charities and enable you to bolster your cyber security posture.<img fetchpriority="high" decoding="async" class="aligncenter size-full wp-image-2774" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Charities-large.jpg" alt="Cyber Security for Charities" width="675" height="675" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Charities-large.jpg 675w, https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Charities-large-300x300.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Charities-large-150x150.jpg 150w" sizes="(max-width: 675px) 100vw, 675px" /></p>
<p>&nbsp;</p>
<h3>Use Multi-factor Authentication (MFA):</h3>
<p>Implementing MFA adds an extra layer of security to your accounts by requiring multiple forms of authentication. This significantly reduces the risk of unauthorised access even if a password is compromised. Enable MFA for your email, cloud storage, social media and other critical business applications.</p>
<h3>Implement Strong Password Policies:</h3>
<p>Encourage your staff and volunteers to use complex passwords that include a mix of letters, numbers, and symbols. Discourage them from reusing passwords across different accounts. Consider implementing a password manager to securely generate and store strong passwords.</p>
<h3>Educate Your Staff and Volunteers:</h3>
<p>Start by ensuring that all staff and volunteers are aware of the importance of cyber security. Conduct at least annual training sessions to educate them about potential threats, such as phishing emails and suspicious websites. Teach them how to create strong, unique passwords and emphasise the significance of MFA.</p>
<h3>Update Software Regularly:</h3>
<p>Outdated software can leave your charity vulnerable to cyber attacks. Regularly update your operating systems, applications, and security software to ensure you have the latest patches and bug fixes. Enable automatic updates whenever possible to streamline the process.</p>
<h3>Backup Your Data:</h3>
<p>Regularly backing up your charity&#8217;s data is crucial. Choose a secure, reliable cloud-based backup solution or an offline backup method to protect your critical information. Test the restoration process periodically to ensure the backups are functioning correctly.</p>
<h3>Secure Your Wi-Fi Network:</h3>
<p>A secure Wi-Fi network is vital for protecting sensitive charity data. Change the default router password and ensure that you use strong encryption, such as WPA2 or WPA3. Additionally, create a separate guest network for visitors and ensure that it is isolated from your internal network.</p>
<h3>So that is how you can do cyber security for charities</h3>
<p>Cyber security is of paramount importance for charities, as it protects sensitive data and preserves the trust of supporters. By following these essential cyber security tips, charities can significantly strengthen their defences against cyber threats. Maintain a proactive approach to cyber security for charities, regularly review and update your security measures, and stay vigilant to evolving risks. With robust cyber security measures in place, your charity can continue making a positive impact while safeguarding its digital assets.</p>
<hr />
<h3>L2 Cyber Security can help you with all of the above if you want</h3>
<p>We are a completely independent cyber security consultancy. We have no solutions or products to sell and are a small business, so we can focus on delivering appropriate and <a href="https://www.l2cybersecurity.com/#ourservices" target="_blank" rel="noopener">relevant services</a> to this sector. Also, we offer a 10% discount on all of our standard rates to registered charities.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a>.</p>
<p>If you want to carry out your own cyber risk assessment, we suggest that you use the <a href="https://www.enisa.europa.eu/" target="_blank" rel="noopener">ENISA</a> (the EU Agency for Cybersecurity) <a href="https://www.enisa.europa.eu/risk-level-tool/risk" target="_blank" rel="noopener">on-line assessment tool</a>.</p>
<p>Let’s be careful out there.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-for-charities/">Cyber Security for Charities</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Security for Small Business</title>
		<link>https://www.l2cybersecurity.com/cyber-security-for-small-business/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Wed, 10 May 2023 17:20:24 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Cyber]]></category>
		<category><![CDATA[Cyber Security for Small Business]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[Cybersecurity for Small Business]]></category>
		<category><![CDATA[Small Business]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2764</guid>

					<description><![CDATA[<p>In today&#8217;s connected world, small businesses are increasingly vulnerable to cyber threats. Protecting your business from potential breaches and data leaks is essential for maintaining trust and safeguarding your reputation. Fortunately, there are simple steps you can take to enhance your cyber security. In this post, I will discuss some valuable tips to help your&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-for-small-business/">Cyber Security for Small Business</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In today&#8217;s connected world, small businesses are increasingly vulnerable to cyber threats. Protecting your business from potential breaches and data leaks is essential for maintaining trust and safeguarding your reputation. <span id="more-2764"></span>Fortunately, there are simple steps you can take to enhance your cyber security. In this post, I will discuss some valuable tips to help your cyber security for small business and stay safe in the online realm.</p>
<p><img decoding="async" class="aligncenter size-full wp-image-2768" src="https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Small-Business-large.jpg" alt="Cyber Security for Small Business" width="675" height="675" srcset="https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Small-Business-large.jpg 675w, https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Small-Business-large-300x300.jpg 300w, https://www.l2cybersecurity.com/wp-content/uploads/2023/05/Cyber-Security-for-Small-Business-large-150x150.jpg 150w" sizes="(max-width: 675px) 100vw, 675px" /></p>
<h3>Use Multi-factor Authentication (MFA):</h3>
<p>Implementing MFA adds an extra layer of security to your accounts by requiring multiple forms of authentication. This significantly reduces the risk of unauthorised access even if a password is compromised. Enable MFA for your email, cloud storage, social media and other critical business applications.</p>
<h3>Implement Strong Password Policies:</h3>
<p>Encourage your employees to use complex passwords that include a mix of letters, numbers, and symbols. Discourage them from reusing passwords across different accounts. Consider implementing a password manager to securely generate and store strong passwords.</p>
<h3>Educate Your Staff:</h3>
<p>Start by ensuring that all employees are aware of the importance of cyber security. Conduct at least annual training sessions to educate them about potential threats, such as phishing emails and suspicious websites. Teach them how to create strong, unique passwords and emphasise the significance of MFA.</p>
<h3>Update Software Regularly:</h3>
<p>Outdated software can leave your business vulnerable to cyber attacks. Regularly update your operating systems, applications, and security software to ensure you have the latest patches and bug fixes. Enable automatic updates whenever possible to streamline the process.</p>
<h3>Backup Your Data:</h3>
<p>Regularly backing up your business data is crucial. Choose a reliable cloud-based backup solution or an offline backup method to protect your critical information. Test the restoration process periodically to ensure the backups are functioning correctly.</p>
<h3>Secure Your Wi-Fi Network:</h3>
<p>A secure Wi-Fi network is vital for protecting sensitive business data. Change the default router password and ensure that you use strong encryption, such as WPA2 or WPA3. Additionally, create a separate guest network for visitors and ensure that it is isolated from your internal network.</p>
<h3>So that is how you can do cyber security for small business</h3>
<p>Protecting your small business from cyber threats should be a top priority. By following these simple cyber security tips, you can significantly enhance your defences and minimise the risk of breaches and data loss. Remember, a proactive approach to cyber security for small business is the key to keeping your business safe in the digital world. Stay vigilant and regularly review your security measures to adapt to evolving threats.</p>
<hr />
<h3>L2 Cyber Security can help you with all of the above if you want</h3>
<p>We are a completely independent cyber security consultancy. We have no solutions or products to sell and are a small business too, so we do offer <a href="https://www.l2cybersecurity.com/#ourservices" target="_blank" rel="noopener">various services</a> which are suited to this sector.</p>
<p>Contact us for more information at <a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a>.</p>
<p>If you want to carry out your own cyber risk assessment, we suggest that you use the <a href="https://www.enisa.europa.eu/" target="_blank" rel="noopener">ENISA</a> (the EU Agency for Cybersecurity) <a href="https://www.enisa.europa.eu/risk-level-tool/risk" target="_blank" rel="noopener">on-line assessment tool</a>.</p>
<p>Let’s be careful out there.</p>
<p>#SecuritySimplified</p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-for-small-business/">Cyber Security for Small Business</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Legal Basis for Processing</title>
		<link>https://www.l2cybersecurity.com/gdpr-legal-basis-for-processing/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 14 Apr 2023 14:44:07 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Legal Basis]]></category>
		<category><![CDATA[Legal Basis for Processing]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2739</guid>

					<description><![CDATA[<p>The General Data Protection Regulation (GDPR) outlines the conditions under which there is a legal basis for processing personal data. Download Detailed Guidance Here The Six Lawful Bases for Processing: To collect or use personal data legally, you cannot just "want" to do it. You must rely on one of six specific legal justifications (Article&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-legal-basis-for-processing/">Legal Basis for Processing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2739 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2739"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-59316e6177fc3 fl-row-default-height fl-row-align-center" data-node="59316e6177fc3">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-59316e6178bfb" data-node="59316e6178bfb">
			<div class="fl-col fl-node-59316e6178d5a fl-col-bg-color" data-node="59316e6178d5a">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-z7y2e5gamipf" data-node="z7y2e5gamipf">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><span style="color: #000000;"><a style="color: #000000;" href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e1888-1-1" target="_blank" rel="noopener">The General Data Protection Regulation (GDPR)</a> outlines the conditions under which there is a legal basis for processing personal data.</span></p>
<p><!--more--></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-owx9h013v2js" data-node="owx9h013v2js">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Legal-Basis-for-Processing.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-rich-text fl-node-smkepv8xnwgr" data-node="smkepv8xnwgr">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<h2><a name="_Toc222253324"></a>The Six Lawful Bases for Processing:</h2>
<p>To collect or use personal data legally, you cannot just "want" to do it. You must rely on one of six specific legal justifications (<a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e1888-1-1">Article 6</a>). If you cannot fit your processing into one of these boxes, you cannot collect the data.</p>
<p>You must identify and document one of these bases before you start processing data.</p>
<ul>
<li><strong>Consent:</strong> The individual has given you clear, specific permission to process their data for a specific purpose.</li>
<li><strong>Contract:</strong> You need to process the data to fulfil a contract with the individual (e.g., you need their address to deliver goods they bought).</li>
<li><strong>Legal Obligation:</strong> You are required by law to process the data (e.g., keeping salary records for tax purposes).</li>
<li><strong>Vital Interests:</strong> It is a life-or-death situation (e.g., giving emergency medical data to a hospital to save someone's life).</li>
<li><strong>Legitimate Interests:</strong> You have a genuine business reason (like fraud prevention or network security), and this reason is not overridden by the individual's rights or freedoms.</li>
<li><strong>Public Interest:</strong> You are performing a task in the public interest or acting under official authority (usually applies to government bodies, not private companies).</li>
</ul>
<p>&nbsp;</p>
<h2><a name="_Toc222253325"></a>1. Strict Rules for "Consent"</h2>
<p>If you choose "Consent" as your legal basis, the bar is set very high. You must be able to prove you obtained it validly.</p>
<ul>
<li><strong>Freely Given:</strong> The user must have a real choice. You cannot force them to consent or punish them if they say no.</li>
<li><strong>Informed:</strong> They must know exactly who you are and what you are doing with their data.</li>
<li><strong>Specific:</strong> You cannot ask for "blanket consent." You must ask for permission for each specific purpose.</li>
<li><strong>Clear Affirmative Action:</strong> The user must do something to consent (like ticking a box). You must also keep a record of this consent being given. Pre-ticked boxes are banned.</li>
<li><strong>Easy Withdrawal:</strong> You must tell them they can withdraw consent at any time, and if they do, you must stop processing immediately.</li>
</ul>
<p>&nbsp;</p>
<h2>2. <a name="_Toc222253328"></a>Contractual Necessity</h2>
<p><strong>When to use it:</strong> Use this when you have a contract with an individual (or are about to enter one) and you literally cannot do your job without their data.</p>
<p><strong>The Rule:</strong> The processing must be necessary for the performance of a contract to which the individual is a party.</p>
<p><strong>Practical Example:</strong> If you sell a product online, you need the customer's address to deliver it. You don't need their consent for the address. You need it to fulfil the contract of sale.</p>
<p><strong>Constraint:</strong> You cannot use this for things that are "nice to have" but not essential to the contract (e.g., using that same address for marketing newsletters usually requires a different basis, like Consent).</p>
<p>&nbsp;</p>
<h2><a name="_Toc222253329"></a>3. Legal Obligation</h2>
<p><strong>When to use it:</strong> Use this when you have no choice because the law says you must process the data.</p>
<p><strong>The Rule:</strong> The processing is necessary for compliance with a legal obligation.</p>
<p><strong>Practical Example:</strong> You are required by tax laws to keep records of employee salaries for a certain number of years. Even if an employee asks you to delete their data, you can refuse because you have a legal obligation to keep it.</p>
<p><strong>Constraint:</strong> This must be a statutory obligation (EU or National law), not just a contractual obligation to a third party or your own company policy.</p>
<p>&nbsp;</p>
<h2><a name="_Toc222253330"></a>4. Vital Interests</h2>
<p><strong>When to use it:</strong> This is the "Emergency Only" basis. It applies to life-or-death situations.</p>
<p><strong>The Rule:</strong> The processing is necessary to protect the vital interests of the data subject or another person.</p>
<p><strong>Practical Example:</strong> If a visitor to your office collapses and is unconscious, you might disclose their medical allergies (if known) to the paramedics. You don't need to wake them up to get consent because their life (vital interest) is at risk.</p>
<p><strong>Constraint:</strong> You generally cannot use this for large-scale data processing or health data unless it is truly a medical emergency.</p>
<p>&nbsp;</p>
<h2><a name="_Toc222253331"></a>5. Legitimate Interests</h2>
<p><strong>When to use it:</strong> This is the most flexible basis, often used for business activities like fraud prevention, network security, or direct marketing. However, it requires a careful "Balancing Test".</p>
<p><strong>The Rule:</strong> Processing is necessary for your legitimate interests (or those of a third party), UNLESS those interests are overridden by the individual's fundamental rights and freedoms.</p>
<p><strong>The "Balancing Test":</strong> You must weigh your benefit against the user's privacy:</p>
<p><strong>Your side:</strong> "We need to process IP addresses to stop hackers attacking our website." (This is a strong legitimate interest).</p>
<p><strong>Their side:</strong> "Does this hurt the user's privacy?" (Likely minimal impact).</p>
<p><strong>Result:</strong> You can probably proceed.</p>
<p><strong>Constraint:</strong> If the processing would be unexpected, cause harm, or if the individual is a child, their rights likely override your interests. You must document this assessment.</p>
<p>&nbsp;</p>
<h2><a name="_Toc222253332"></a>6. Public Interest / Official Authority</h2>
<p><strong>When to use it:</strong> This is primarily for public authorities (like schools, hospitals, police, or councils) performing their official duties.</p>
<p><strong>The Rule:</strong> The processing is necessary for the performance of a task carried out in the public interest or in the exercise of official authority vested in you.</p>
<p><strong>Practical Example:</strong> A local council collecting data to organise bin collection or a tax authority collecting income data.</p>
<p><strong>Constraint:</strong> Private companies rarely use this unless they are contracted to carry out specific public tasks (e.g., a private utility company maintaining the water supply).</p>
<p>&nbsp;</p>
<p><span style="color: #ff0000;"><strong><a style="color: #ff0000;" href="https://www.l2cybersecurity.com/gdpr/">&lt;Return Home&gt;</a></strong></span></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-k83hnq942ex6" data-node="k83hnq942ex6">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Legal-Basis-for-Processing.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/gdpr-legal-basis-for-processing/">Legal Basis for Processing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Principles of the GDPR</title>
		<link>https://www.l2cybersecurity.com/gdpr-principles-of-the-gdpr/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 14 Apr 2023 14:37:37 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GDPR Principles]]></category>
		<category><![CDATA[Principles of the GDPR]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2735</guid>

					<description><![CDATA[<p>The General Data Protection Regulation (GDPR) sets out the principles of the GDPR that organisations must follow when processing personal data. Download Detailed Guidance Here Principles of the GDPR Here is a simplified guide to the 7 Core Principles of the GDPR (Article 5). Think of these not just as codes, but as the "Golden&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-principles-of-the-gdpr/">Principles of the GDPR</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2735 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2735"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-59316e6177fc3 fl-row-default-height fl-row-align-center" data-node="59316e6177fc3">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-6uevfy4tsmk3" data-node="6uevfy4tsmk3">
			<div class="fl-col fl-node-tywc61d08b2m fl-col-bg-color" data-node="tywc61d08b2m">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-wlgck6yehmd9" data-node="wlgck6yehmd9">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><span style="color: #000000;"><a style="color: #000000;" href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e1807-1-1" target="_blank" rel="noopener">The General Data Protection Regulation (GDPR)</a> sets out the principles of the GDPR that organisations must follow when processing personal data.</span></p>
<p><!--more--></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-f32r8zk7jtn6" data-node="f32r8zk7jtn6">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Principles-of-the-GDPR.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-rich-text fl-node-pc8s63b9lxrh" data-node="pc8s63b9lxrh">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<h1><strong>Principles of the GDPR</strong></h1>
<p>Here is a simplified guide to the 7 Core Principles of the GDPR (<a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e1807-1-1">Article 5</a>).</p>
<p>Think of these not just as codes, but as the "Golden Rules" for how you handle data. If you violate these principles, you are violating the GDPR, even if your security is technically perfect.</p>
<p>&nbsp;</p>
<h2>Lawfulness, Fairness, and Transparency</h2>
<p><strong>Your Obligation:</strong> You must be honest and open about what you are doing.</p>
<p><strong>Lawful:</strong> You cannot process data just because you want to. You need a valid legal reason (like Consent or a Contract).</p>
<p><strong>Fair:</strong> You shouldn't do things with data that people wouldn't expect or that could mislead them. You must give them control over their information.</p>
<p><strong>Transparent:</strong> You can't hide in the shadows. You must provide clear, accessible information (usually a Privacy Notice) explaining exactly how you process their data.</p>
<p>&nbsp;</p>
<h2>Purpose Limitation</h2>
<p><strong>Your Obligation:</strong> Be specific about why you need the data and stick to that reason.</p>
<p><strong>The Rule:</strong> You must collect data for "specified, explicit, and legitimate purposes".</p>
<p><strong>No "Scope Creep":</strong> You cannot collect data for one reason (e.g., "to deliver a pizza") and then use it for a completely different reason later (e.g., "to sell their address to a gym"), unless you get fresh consent or have another clear legal reason.</p>
<p><strong>Communication:</strong> You must tell the individual this purpose at the start.</p>
<p>&nbsp;</p>
<h2>Data Minimisation</h2>
<p><strong>Your Obligation:</strong> Collect only what you strictly need.</p>
<p><strong>The Rule:</strong> Data must be adequate, relevant, and limited to what is necessary for your specific purpose.</p>
<p><strong>Practical Step:</strong> If you don't need someone's date of birth to sell them a book, don't ask for it. Avoid hoarding "just in case" data.</p>
<p>&nbsp;</p>
<h2>Accuracy</h2>
<p><strong>Your Obligation:</strong> Keep the data correct and up to date.</p>
<p><strong>The Rule:</strong> You must take reasonable steps to ensure data is not incorrect or misleading.</p>
<p><strong>Correction:</strong> If you find out data is wrong, you must fix it or erase it without delay. You should also give individuals an easy way to update their own records.</p>
<p>&nbsp;</p>
<h2>Storage Limitation</h2>
<p><strong>Your Obligation:</strong> Don't keep data forever.</p>
<p><strong>The Rule:</strong> You must not keep personal data for longer than you actually need it for your stated purpose.</p>
<p><strong>Guidance:</strong> There may be a statutory requirement for a retention period (e.g. Revenue), or a supervisory body providing guidance. If neither exist, then set your own retention period and document the justification for it.</p>
<p><strong>Retention Policy:</strong> You need a clear policy that says when you will delete data. When that time comes, you must securely erase or anonymise it.</p>
<p>&nbsp;</p>
<h2>Integrity and Confidentiality (Security)</h2>
<p><strong>Your Obligation:</strong> Keep the data safe.</p>
<p><strong>The Rule:</strong> You must protect data against unauthorised access, accidental loss, destruction, or damage.</p>
<p><strong>Measures:</strong> This isn't just about firewalls. It includes organisational measures like taking data backups, restricting access so only the staff who need to see the data can see it, amongst other things.</p>
<p>&nbsp;</p>
<h2><em><strong>Accountability</strong></em></h2>
<p><strong>Your Obligation:</strong> Prove it.</p>
<p><strong>The Rule:</strong> It is not enough to just comply with these principles. You must be able to demonstrate that you comply.</p>
<p><strong>Documentation:</strong> This requires you to have written policies, records of your processing activities, and internal procedures in place to show regulators that you take these rules seriously.</p>
<h2><strong style="color: #ff0000; font-size: 16px;"><a style="color: #ff0000;" href="https://www.l2cybersecurity.com/gdpr/">&lt;Return Home&gt;</a></strong></h2>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-6skdhpegzwc0" data-node="6skdhpegzwc0">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Principles-of-the-GDPR.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/gdpr-principles-of-the-gdpr/">Principles of the GDPR</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Rights of an Individual</title>
		<link>https://www.l2cybersecurity.com/gdpr-rights-of-an-individual/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Fri, 14 Apr 2023 13:46:30 +0000</pubDate>
				<category><![CDATA[GDPR]]></category>
		<category><![CDATA[Individual's Rights]]></category>
		<category><![CDATA[Rights of an individual]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2732</guid>

					<description><![CDATA[<p>The General Data Protection Regulation (GDPR) provides strong rights of an individual, whose personal data is being processed by organisations. Download Detailed Guidance Here The Rights of an Individual The right to be informed Article 13 and Article 14. Your Obligation: You must be completely transparent about how you use personal data. You cannot collect&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/gdpr-rights-of-an-individual/">Rights of an Individual</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2732 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2732"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-59316e6177fc3 fl-row-default-height fl-row-align-center" data-node="59316e6177fc3">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-59316e6178bfb" data-node="59316e6178bfb">
			<div class="fl-col fl-node-59316e6178d5a fl-col-bg-color" data-node="59316e6178d5a">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-pyocfb5ue2r4" data-node="pyocfb5ue2r4">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2161-1-1" target="_blank" rel="noopener">The General Data Protection Regulation (GDPR)</a> provides strong rights of an individual, whose personal data is being processed by organisations.</p>
<p><!--more--></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-noqujwizr2fs" data-node="noqujwizr2fs">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Rights-of-an-Individual.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-rich-text fl-node-2rfcs1d89elm" data-node="2rfcs1d89elm">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<h1>The Rights of an Individual</h1>
<h2><a name="_Toc484164476"></a><a name="_Toc132378641"></a>The right to be informed</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2254-1-1">Article 13</a> and <a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2355-1-1">Article 14</a>.</p>
<p><strong>Your Obligation:</strong> You must be completely transparent about how you use personal data. You cannot collect data in secret; you must provide "fair processing information," typically through a Privacy Notice.</p>
<p><strong>What to include:</strong> You must detail your identity and contact info (and that of your DPO), why you are processing the data and the legal basis for doing so, how long you will keep it, and who else will receive it. You must also list the users' rights, including their right to withdraw consent or lodge a complaint.</p>
<p><strong>Format:</strong> The information must be concise, transparent, intelligible, easily accessible, and free of charge. It must be written in clear, plain language—especially if addressed to a child.</p>
<p><strong>Timing:</strong></p>
<ul>
<li><strong>Direct Collection:</strong> If you got the data straight from the individual, give them this info at the time you collect it.</li>
<li><strong>Indirect Collection:</strong> If you got the data from elsewhere, you must inform the individual within a reasonable period (maximum one month), or at the point you first communicate with them or share the data with someone else.</li>
</ul>
<p>The table below summarises the information you should supply to individuals where the personal data has been obtained either directly from the data subject or by another means.</p>
<table>
<tbody>
<tr>
<td width="301">Identity and contact details of the controller (and where applicable, the controller’s representative) and the data protection officer.</td>
<td width="301">The existence of automated decision making, including profiling and information about how decisions are made, the significance and the consequences.</td>
</tr>
<tr>
<td width="301">Any recipient or categories of recipients of the personal data.</td>
<td width="301">Purpose of the processing and the legal basis for the processing.</td>
</tr>
<tr>
<td width="301">The right to lodge a complaint with a supervisory authority.</td>
<td width="301">The existence of each of data subject’s rights.</td>
</tr>
<tr>
<td width="301">Retention period or criteria used to determine the retention period.</td>
<td width="301">Details of transfers to a different country and what safeguards apply.</td>
</tr>
<tr>
<td width="301">The right to withdraw consent at any time, where relevant.</td>
<td width="301">The legitimate interests of the controller or third party, where applicable.</p>
<p>&nbsp;</td>
</tr>
</tbody>
</table>
<p>If the personal data was obtained directly from the data subject, then you should provide them with the above information at the time you get the personal data.</p>
<p>The next table summarises the information you should supply to individuals where the personal data has not been obtained directly from the data subject.</p>
<table>
<tbody>
<tr>
<td width="301">The source the personal data originates from and whether it came from publicly accessible sources.</td>
<td width="301">Categories of personal data.</td>
</tr>
</tbody>
</table>
<p>&nbsp;</p>
<h2><a name="_Toc484164478"></a><a name="_Toc132378642"></a>The right of access (Subject Access Requests)</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2513-1-1">Article 15</a>.</p>
<p><strong> </strong><strong>Your Obligation:</strong> You must allow individuals to verify that their data is being processed lawfully. If asked, you must confirm you are processing their data and provide a copy of it.</p>
<p><strong> </strong><strong>Deadlines:</strong> You must respond without delay, and at the latest within one month.</p>
<p><strong> </strong><strong>Extension:</strong> You can extend this by two months if the request is complex or numerous, but you must notify the individual within the first month and explain why.</p>
<p><strong> </strong><strong>Fees:</strong> You generally cannot charge a fee.</p>
<p style="padding-left: 40px;"><strong><em>Exception:</em></strong> You may charge a "reasonable fee" based on administrative costs only if the request is "manifestly unfounded or excessive" (e.g., repetitive) or for additional copies.</p>
<p><strong> </strong><strong>Verification:</strong> You must verify the identity of the requester using reasonable means before handing over data.</p>
<p style="padding-left: 40px;"><strong>Suggested ways:</strong></p>
<ul>
<li style="list-style-type: none;">
<ul>
<li>Ask the individual to confirm details only they would know based on the data you already hold. Ask 2-3 specific questions:
<ul>
<li>"Please confirm the amount of your last transaction with us."</li>
<li>"What is the reference number on your most recent bill?"</li>
<li>"Please confirm the phone number we have on file for you."</li>
</ul>
</li>
<li>Require the user to log in to their secure account area to submit the request.</li>
<li>If you must ask for photo ID, ask them to redact unnecessary information – e.g. “Please send a photo of your driving licence, but please black out your licence number and date of birth. We only need to see your name and photo”</li>
</ul>
</li>
</ul>
<p><strong> </strong><strong>Format:</strong> If the request is made electronically, you should provide the data in a commonly used electronic format.</p>
<p><a name="_Toc484164485"></a><strong> </strong></p>
<h2><a name="_Toc132378643"></a>The right to rectification</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2599-1-1">Article 16</a>.</p>
<p><a name="_Toc484164487"></a><a name="_Toc132378644"></a><strong> </strong><strong>Your Obligation:</strong> You must correct inaccurate or incomplete personal data upon request.</p>
<p><strong>Third Parties:</strong> If you have shared this data with other organisations, you must inform them of the correction if possible.</p>
<p><strong>Deadlines:</strong> You have one month to comply. This can be extended by two months for complex requests, provided you notify the individual.</p>
<p><strong>Refusal:</strong> If you decide not to take action, you must explain why and inform the individual of their right to complain to a supervisory authority.</p>
<p>&nbsp;</p>
<h2>The right to erasure ("Right to be Forgotten")</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2606-1-1">Article 17</a>.</p>
<p><a name="_Toc484164492"></a><strong> </strong><strong>Your Obligation:</strong> You must delete personal data when there is no compelling reason to keep it. <strong><u>BUT</u></strong> this is not an absolute right. You are quite likely to refuse this one, as its scope is quite narrow.</p>
<p><strong>When to delete:</strong> You must act if:</p>
<ol>
<li>consent is withdrawn</li>
<li>the data is no longer needed for its original purpose</li>
<li>it was processed unlawfully</li>
<li>if there is a legal obligation to delete it</li>
</ol>
<p>Special attention is required for data collected from children online.</p>
<p><strong>Public Data:</strong> If you have made the data public (e.g., on a website), you must take reasonable steps to inform other controllers processing that data to erase links to or copies of it.</p>
<p><strong>Exceptions:</strong> You can refuse deletion if the processing is necessary for freedom of expression, public health, contractual, legal obligations, or the defence of legal claims.</p>
<p>&nbsp;</p>
<h2><a name="_Toc132378645"></a>The right to restrict processing</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2700-1-1">Article 18</a>.</p>
<p><a name="_Toc484164494"></a> <strong>Your Obligation:</strong> In specific circumstances, you must stop using the data but keep it stored. You can retain just enough info to ensure the restriction is respected in the future.</p>
<p><strong>When to restrict:</strong> You must apply this if an individual contests the accuracy of data (while you verify it), if they object to processing (while you verify your legitimate grounds), or if the processing is unlawful but the individual prefers restriction over deletion.</p>
<p><strong>Notification:</strong> You must inform any third parties you shared the data with about the restriction. You must also tell the individual before you lift the restriction.</p>
<p><strong> </strong></p>
<h2><a name="_Toc132378646"></a>The right to data portability</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2753-1-1">Article 20</a>.</p>
<p><a name="_Toc484164498"></a> <strong>Your Obligation:</strong> You must allow individuals to obtain and reuse their data across different services by providing it in a format that allows easy transfer.</p>
<p><strong>Format:</strong> Provide the data in a structured, commonly used, and machine-readable form (e.g., CSV files) so software can extract the data.</p>
<p><strong>Scope:</strong> This applies only to data the individual provided to you, processed by automated means, based on consent or a contract.</p>
<p><strong>Direct Transfer:</strong> If the individual asks and it is technically feasible, you should transfer the data directly to another organisation.</p>
<p><strong> </strong></p>
<h2><a name="_Toc132378647"></a>The right to object</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2803-1-1">Article 21</a>.</p>
<p><a name="_Toc484164503"></a> <strong>Your Obligation:</strong> You must respect an individual's right to say "no" to processing in certain cases.</p>
<p><strong>Direct Marketing:</strong> If an individual objects to direct marketing, you must stop immediately. There are no exemptions or grounds to refuse.</p>
<p><strong>Legitimate Interests/Public Task:</strong> If they object to processing based on these grounds, you must stop unless you can demonstrate "compelling legitimate grounds" that override their rights, or if it is for legal claims.</p>
<p><strong>Communication:</strong> You must explicitly bring this right to their attention at the point of first communication and in your privacy notice, keeping it separate from other information.</p>
<p><strong> </strong></p>
<h2><a name="_Toc132378648"></a>Rights in relation to automated decision making and profiling</h2>
<p><a href="https://eur-lex.europa.eu/legal-content/EN/TXT/HTML/?uri=CELEX:32016R0679&amp;from=EN#d1e2838-1-1">Article 22</a>.</p>
<p><strong>Your Obligation:</strong> You must provide safeguards against potentially damaging decisions made solely by computers without human intervention.</p>
<p><strong>The Right:</strong> Individuals can refuse to be subject to automated decisions that have legal or significant effects on them.</p>
<p><strong>Safeguards:</strong> If you use automated decision-making, you must allow the individual to obtain human intervention, express their point of view, and obtain an explanation of the decision so they can challenge it.</p>
<p><strong>Profiling:</strong> If you use profiling (analysing personal aspects like performance, health, or location), you must be transparent about the logic involved and the significance of the consequences. You must use appropriate mathematical procedures and secure the data to prevent errors or discrimination.</p>
<p>&nbsp;</p>
<p><span style="color: #ff0000;"><strong><a style="color: #ff0000;" href="https://www.l2cybersecurity.com/gdpr/">&lt;Return Home&gt;</a></strong></span></p>
</div>
	</div>
</div>
<div class="fl-module fl-module-button fl-node-p687qt9i0vao" data-node="p687qt9i0vao">
	<div class="fl-module-content fl-node-content">
		<div class="fl-button-wrap fl-button-width-auto fl-button-left fl-button-has-icon">
			<a href="https://www.l2cybersecurity.com/wp-content/uploads/2026/02/Rights-of-an-Individual.pdf"  target="_self"  download class="fl-button" >
					<i class="fl-button-icon fl-button-icon-before dashicons dashicons-before dashicons-download" aria-hidden="true"></i>
						<span class="fl-button-text">Download Detailed Guidance Here</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/gdpr-rights-of-an-individual/">Rights of an Individual</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cyber Security Scams in the COVID19 era &#8211; webinar</title>
		<link>https://www.l2cybersecurity.com/cyber-security-scams-in-the-covid19-era-webinar/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 06 Apr 2020 13:38:29 +0000</pubDate>
				<category><![CDATA[Services]]></category>
		<category><![CDATA[#SecuritySimplified]]></category>
		<category><![CDATA[Clare]]></category>
		<category><![CDATA[Covid19]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Limerick]]></category>
		<category><![CDATA[Tipperary]]></category>
		<category><![CDATA[Webinar]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=1910</guid>

					<description><![CDATA[<p>The world has been put into a state of turmoil as a result of the Coronavirus COVID19 Pandemic. This hasn’t stopped the criminals from trying to exploit the situation. In this webinar on 6th April 2020 Liam Lynch, founder of L2 Cyber Security Solutions covered off: Crisis scams: what to look for and how to protect&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-scams-in-the-covid19-era-webinar/">Cyber Security Scams in the COVID19 era &#8211; webinar</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The world has been put into a state of turmoil as a result of the Coronavirus COVID19 Pandemic. This hasn’t stopped the criminals from trying to exploit the situation. <span id="more-1910"></span>In this webinar on 6th April 2020 Liam Lynch, founder of L2 Cyber Security Solutions covered off:</p>
<ol>
<li>Crisis scams: what to look for and how to protect against them</li>
<li>Remote working: what cyber risks do new home workers face</li>
<li>The Work From Home environment: securing your far flung assets</li>
</ol>
<p>The slides for the webinar <a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/04/2020-04-06-Cyber-Security-Scams-in-the-COVID19-era.pdf" target="_blank" rel="noopener noreferrer">are available here</a>.</p>
<p>Here is the presentation section of the webinar.</p>
<p><div style="width: 720px;" class="wp-video"><video class="wp-video-shortcode" id="video-1910-1" width="720" height="480" preload="metadata" controls="controls"><source type="video/mp4" src="https://www.l2cybersecurity.com/wp-content/uploads/2020/04/COVID19-Webinar_first-part.mp4?_=1" /><a href="https://www.l2cybersecurity.com/wp-content/uploads/2020/04/COVID19-Webinar_first-part.mp4">https://www.l2cybersecurity.com/wp-content/uploads/2020/04/COVID19-Webinar_first-part.mp4</a></video></div></p>
<p><a href="http://www.twitter.com/L2Cyber" target="_blank" rel="noopener noreferrer">www.twitter.com/L2Cyber</a></p>
<p>The post <a href="https://www.l2cybersecurity.com/cyber-security-scams-in-the-covid19-era-webinar/">Cyber Security Scams in the COVID19 era &#8211; webinar</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		<enclosure url="https://www.l2cybersecurity.com/wp-content/uploads/2020/04/COVID19-Webinar_first-part.mp4" length="181591205" type="video/mp4" />

			</item>
		<item>
		<title>Practical GDPR for Small Business Training</title>
		<link>https://www.l2cybersecurity.com/practical-gdpr-for-small-business-training/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 30 Mar 2020 22:56:45 +0000</pubDate>
				<category><![CDATA[Services]]></category>
		<category><![CDATA[GDPR]]></category>
		<category><![CDATA[GDPR Documentation]]></category>
		<category><![CDATA[GDPR for Small Business]]></category>
		<category><![CDATA[GDPR for SME]]></category>
		<category><![CDATA[GDPR for SMEs]]></category>
		<category><![CDATA[GDPR Policies]]></category>
		<category><![CDATA[GDPR Procedures]]></category>
		<category><![CDATA[GDPR Training]]></category>
		<category><![CDATA[Practical GDPR]]></category>
		<category><![CDATA[Practical GDPR for Small Business]]></category>
		<category><![CDATA[Practical GDPR Training]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2113</guid>

					<description><![CDATA[<p>Practical GDPR for Small Business/Charity Training Download these details Make an enquiry L2 Cyber Security Solutions is delighted to be able to offer the following Practical Data Protection Training, in an online and in-person format. Title: Practical GDPR for Small Business/Charity Training. Learning objective: The purpose of this programme is to equip the learner with the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/practical-gdpr-for-small-business-training/">Practical GDPR for Small Business Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2113 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2113"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-5ebc52ba7285c fl-row-default-height fl-row-align-center" data-node="5ebc52ba7285c">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-5ebc52eb93239" data-node="5ebc52eb93239">
			<div class="fl-col fl-node-5ebc52eb933e1 fl-col-bg-color fl-col-small" data-node="5ebc52eb933e1">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-heading fl-node-5ebc52feed684" data-node="5ebc52feed684">
	<div class="fl-module-content fl-node-content">
		<h1 class="fl-heading">
		<span class="fl-heading-text">Practical GDPR for Small Business/Charity Training</span>
	</h1>
	</div>
</div>
</div>
</div>
			<div class="fl-col fl-node-5ebc52eb933ec fl-col-bg-color fl-col-small" data-node="5ebc52eb933ec">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-pp-file-download fl-node-5ebc536edb0b9" data-node="5ebc536edb0b9">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="https://www.l2cybersecurity.com/wp-content/uploads/2023/10/Practical-GDPR-for-Small-Business-Charity.pdf" target="_self" class="pp-button" role="button" download="Practical-GDPR-for-Small-Business-Charity.pdf" aria-label="Download these details">
				<i class="pp-button-icon pp-button-icon-before fi-download"></i>
						<span class="pp-button-text">Download these details</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-pp-smart-button fl-node-5eea854a15d08" data-node="5eea854a15d08">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="mailto:info@l2cybersecurity.com?subject=Practical%20GDPR%20for%20Small%20Business%20Training%20enquiry%20&#038;body=Hi%20there,%0A%0AI%20would%20like%20to%20get%20more%20information%20about%20the%20practical%20GDPR%20for%20small%20business%20training,%20please.%0A" target="_self" class="pp-button" role="button" aria-label="Make an enquiry">
				<i class="pp-button-icon pp-button-icon-before ua-icon ua-icon-icon-6-mail-envelope-closed2"></i>
						<span class="pp-button-text">Make an enquiry</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>

<div class="fl-col-group fl-node-5ebc52ba74e29" data-node="5ebc52ba74e29">
			<div class="fl-col fl-node-5ebc52ba7501e fl-col-bg-color" data-node="5ebc52ba7501e">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-5ebc52ba7fe0c" data-node="5ebc52ba7fe0c">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a> is delighted to be able to offer the following Practical Data Protection Training, in an online and in-person format.</p>
<h2>Title: Practical GDPR for Small Business/Charity Training.</h2>
<h2>Learning objective:</h2>
<p>The purpose of this programme is to equip the learner with the practical knowledge to implement policies and procedures in their organisation. They will also understand the requirements for record keeping.</p>
<h2>Content of the Practical GDPR for Small Business/Charity Training:</h2>
<p>There are three separate modules in this training:</p>
<h3>1.   Module 1 – The basic requirements</h3>
<ul>
<li>Quick question – do you need a Data Protection Officer (DPO)?</li>
<li>Interpreting the GDPR’s principles</li>
<li>Creating a simple Data Inventory</li>
<li>Establishing a Data Protection Policy</li>
</ul>
<h3>2.   Module 2 – The crucial documentation</h3>
<ul>
<li>What needs to be included in a right-to-be-informed page</li>
<li>Producing procedures to handle an individual’s rights</li>
<li>Knowing the kind of records you need to keep</li>
</ul>
<h3>3.   Module 3 – The stuff most people forget about</h3>
<ul>
<li>Understanding Data Processing Agreements</li>
<li>When it hits the fan – using a Data Breach handling procedure</li>
<li>Securing the business with an Information Security Policy</li>
</ul>
<h2>Duration:</h2>
<p>Each Module is 60 minutes, including ample time for Questions and Answers</p>
<h2>Audience:</h2>
<p>Small Business Owners or Data Protection Administrators in small businesses and charities who need to put in place policies, procedures and records keeping for the GDPR in their organisation.</p>
<h2>Delivery Format:</h2>
<ul>
<li>Online – Presentation, using Google Meet (or your own online platform of choice).</li>
<li>In-person – Interactive workshop over the selected duration.</li>
</ul>
<h2>Also Included:</h2>
<ul>
<li>A link to a softcopy of any slides will be provided during the session.</li>
<li>Link to additional free resources would be included too.</li>
<li>Certificates of attendance if required.</li>
</ul>
<h2>Pricing:</h2>
<ul>
<li>Please see our website for our current prices:</li>
</ul>
<p style="padding-left: 40px;"><a href="https://www.l2cybersecurity.com/prices/">https://www.l2cybersecurity.com/prices/</a></p>
<h2>Contact us:</h2>
<p><a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a></p>
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://ie.linkedin.com/in/l2actual">LinkedIn</a>, <a href="https://infosec.exchange/@L2actual">Mastodon</a> and <a href="https://www.youtube.com/@L2actual/videos">YouTube</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/">LinkedIn</a>.</p>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/practical-gdpr-for-small-business-training/">Practical GDPR for Small Business Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A la carte Data Protection Training</title>
		<link>https://www.l2cybersecurity.com/a-la-carte-data-protection-training/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 30 Mar 2020 22:54:36 +0000</pubDate>
				<category><![CDATA[Services]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Data Protection Awareness]]></category>
		<category><![CDATA[Data Protection Awareness Training]]></category>
		<category><![CDATA[Data Protection Training]]></category>
		<category><![CDATA[Staff Data Protection Awareness]]></category>
		<category><![CDATA[Staff Data Protection Awareness Training]]></category>
		<category><![CDATA[Staff Data Protection Training]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2111</guid>

					<description><![CDATA[<p>À la carte Data Protection Training Download these details Make an enquiry L2 Cyber Security Solutions is delighted to be able to offer the following À la carte Data Protection Training, in an online and in-person format. Title: À la carte Data Protection Training. Learning objective: The purpose of this programme is to equip the learner&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/a-la-carte-data-protection-training/">A la carte Data Protection Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2111 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2111"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-5ebc52ba7285c fl-row-default-height fl-row-align-center" data-node="5ebc52ba7285c">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-5ebc52eb93239" data-node="5ebc52eb93239">
			<div class="fl-col fl-node-5ebc52eb933e1 fl-col-bg-color fl-col-small" data-node="5ebc52eb933e1">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-heading fl-node-5ebc52feed684" data-node="5ebc52feed684">
	<div class="fl-module-content fl-node-content">
		<h1 class="fl-heading">
		<span class="fl-heading-text">À la carte Data Protection Training</span>
	</h1>
	</div>
</div>
</div>
</div>
			<div class="fl-col fl-node-5ebc52eb933ec fl-col-bg-color fl-col-small" data-node="5ebc52eb933ec">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-pp-file-download fl-node-5ebc536edb0b9" data-node="5ebc536edb0b9">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="https://www.l2cybersecurity.com/wp-content/uploads/2023/10/A-la-carte-Data-Protection-Training.pdf" target="_self" class="pp-button" role="button" download="A-la-carte-Data-Protection-Training.pdf" aria-label="Download these details">
				<i class="pp-button-icon pp-button-icon-before fi-download"></i>
						<span class="pp-button-text">Download these details</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-pp-smart-button fl-node-5eea7c4790fef" data-node="5eea7c4790fef">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="mailto:info@l2cybersecurity.com?subject=À%20la%20carte%20Data%20Protection%20Training%20enquiry%20&#038;body=Hi%20there,%0A%0AI%20would%20like%20to%20get%20more%20information%20about%20À%20la%20carte%20data%20protection%20Training,%20please.%0A" target="_blank" class="pp-button" role="button" rel="noopener" aria-label="Make an enquiry">
				<i class="pp-button-icon pp-button-icon-before ua-icon ua-icon-icon-6-mail-envelope-closed2"></i>
						<span class="pp-button-text">Make an enquiry</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>

<div class="fl-col-group fl-node-5ebc52ba74e29" data-node="5ebc52ba74e29">
			<div class="fl-col fl-node-5ebc52ba7501e fl-col-bg-color" data-node="5ebc52ba7501e">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-5ebc52ba7fe0c" data-node="5ebc52ba7fe0c">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a> is delighted to be able to offer the following À la carte Data Protection Training, in an online and in-person format.</p>
<h2>Title: À la carte Data Protection Training.</h2>
<h2>Learning objective:</h2>
<p>The purpose of this programme is to equip the learner with the knowledge and skill to identify their organisation’s obligations to protect the personal data of the individuals that they work for and with.</p>
<h2>Our range of topics to choose from include:</h2>
<p><strong>The basics:</strong></p>
<ul>
<li>What is Personal Data and what do we mean by processing</li>
<li>Comprehending the terminology of the GDPR</li>
<li>Do you need a Data Protection Officer (DPO)?</li>
</ul>
<p><strong>The important items:</strong></p>
<ul>
<li>Interpreting the GDPR’s principles</li>
<li>Knowing the rights of the individual</li>
<li>Understanding the appropriate legal basis for processing (incl. consent)</li>
<li>Data Protection by design</li>
<li>How to identify and handle International Transfers</li>
<li>Establish what other documentation is required</li>
</ul>
<p><strong>Documentation and Procedures:</strong></p>
<ul>
<li>Handling Sensitive Personal Data appropriately</li>
<li>Creating a simple Data Inventory</li>
<li>Establishing a Data Protection Policy</li>
<li>What needs to be included in a right-to-be-informed document</li>
<li>Producing procedures to handle an individual’s rights</li>
<li>Knowing the kind of records you need to keep</li>
<li>Understanding Data Processing Agreements</li>
<li>When it hits the fan – using a Data Breach handling procedure</li>
<li>Securing the business with an Information Security Policy</li>
<li>When and How to conduct a Data Protection Impact Assessment</li>
<li>What is a Legitimate Interest Assessment and how should you carry it out</li>
<li>What if it all goes wrong – what can the Data Protection Commission do</li>
</ul>
<h2>Duration:</h2>
<p>Each topic is approximately 20 minutes each, including time for Questions and Answers.</p>
<h2>Audience:</h2>
<p>Staff, contractors or volunteers who have no or limited knowledge of data protection and specifically the GDPR legislation. Also organisations who need to put in place policies, procedures and records keeping for the GDPR in their business.</p>
<h2>Delivery Format:</h2>
<ul>
<li>Online – Presentation, using Google Meet (or your own online platform of choice).</li>
<li>In-person – Interactive workshop over the selected duration.</li>
</ul>
<h2>Also Included:</h2>
<ul>
<li>A link to a softcopy of any slides will be provided during the session.</li>
<li>Link to additional free resources would be included too.</li>
<li>Certificates of attendance if required.</li>
</ul>
<h2>Pricing:</h2>
<ul>
<li>Please see our website for our current prices:</li>
</ul>
<p style="padding-left: 40px;"><a href="https://www.l2cybersecurity.com/prices/">https://www.l2cybersecurity.com/prices/</a></p>
<h2>Contact us:</h2>
<p><a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a></p>
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://ie.linkedin.com/in/l2actual">LinkedIn</a>, <a href="https://infosec.exchange/@L2actual">Mastodon</a> and <a href="https://www.youtube.com/@L2actual/videos">YouTube</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/">LinkedIn</a>.</p>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/a-la-carte-data-protection-training/">A la carte Data Protection Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Staff Data Protection Awareness Training</title>
		<link>https://www.l2cybersecurity.com/staff-data-protection-awareness-training/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 30 Mar 2020 22:52:57 +0000</pubDate>
				<category><![CDATA[Services]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Data Protection Awareness]]></category>
		<category><![CDATA[Data Protection Awareness Training]]></category>
		<category><![CDATA[Staff Data Protection Awareness]]></category>
		<category><![CDATA[Staff Data Protection Awareness Training]]></category>
		<category><![CDATA[Staff Data Protection Training]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2112</guid>

					<description><![CDATA[<p>Staff Data Protection Awareness Training Download these details Make an enquiry L2 Cyber Security Solutions is delighted to be able to offer the following Staff Data Protection Training, in an online and in-person format. Title: Data Protection Awareness Training for staff. Learning objective: The purpose of this programme is to equip the learner with the knowledge&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/staff-data-protection-awareness-training/">Staff Data Protection Awareness Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2112 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2112"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-5ebc52ba7285c fl-row-default-height fl-row-align-center" data-node="5ebc52ba7285c">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-5ebc52eb93239" data-node="5ebc52eb93239">
			<div class="fl-col fl-node-5ebc52eb933e1 fl-col-bg-color fl-col-small" data-node="5ebc52eb933e1">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-heading fl-node-5ebc52feed684" data-node="5ebc52feed684">
	<div class="fl-module-content fl-node-content">
		<h1 class="fl-heading">
		<span class="fl-heading-text">Staff Data Protection Awareness Training</span>
	</h1>
	</div>
</div>
</div>
</div>
			<div class="fl-col fl-node-5ebc52eb933ec fl-col-bg-color fl-col-small" data-node="5ebc52eb933ec">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-pp-file-download fl-node-5ebc536edb0b9" data-node="5ebc536edb0b9">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="https://www.l2cybersecurity.com/wp-content/uploads/2023/10/Staff-Data-Protection-Awareness-Training.pdf" target="_self" class="pp-button" role="button" download="Staff-Data-Protection-Awareness-Training.pdf" aria-label="Download these details">
				<i class="pp-button-icon pp-button-icon-before fi-download"></i>
						<span class="pp-button-text">Download these details</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-pp-smart-button fl-node-5eea7c4790fef" data-node="5eea7c4790fef">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="mailto:info@l2cybersecurity.com?subject=Staff%20Data%20Protection%20awareness%20training%20enquiry%20&#038;body=Hi%20there,%0A%0AI%20would%20like%20to%20get%20more%20information%20about%20staff%20data%20protection%20awarenesss%20training,%20please.%0A" target="_blank" class="pp-button" role="button" rel="noopener" aria-label="Make an enquiry">
				<i class="pp-button-icon pp-button-icon-before ua-icon ua-icon-icon-6-mail-envelope-closed2"></i>
						<span class="pp-button-text">Make an enquiry</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>

<div class="fl-col-group fl-node-5ebc52ba74e29" data-node="5ebc52ba74e29">
			<div class="fl-col fl-node-5ebc52ba7501e fl-col-bg-color" data-node="5ebc52ba7501e">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-5ebc52ba7fe0c" data-node="5ebc52ba7fe0c">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a> is delighted to be able to offer the following Staff Data Protection Training, in an online and in-person format.</p>
<h2>Title: Data Protection Awareness Training for staff.</h2>
<h2>Learning objective:</h2>
<p>The purpose of this programme is to equip the learner with the knowledge and skill to identify their organisation’s obligations to protect the personal data of the individuals that they work for and with.</p>
<h2>Content of the Staff Data Protection Awareness Training:</h2>
<p>There are three separate modules in this training.</p>
<h3>1.   Module 1 – The basics</h3>
<ul>
<li>What is Personal Data and what do we mean by processing</li>
<li>Comprehending the terminology of the GDPR</li>
<li>Interpreting the GDPR’s principles</li>
</ul>
<h3>2.   Module 2 – The important stuff</h3>
<ul>
<li>Knowing the rights of the individual</li>
<li>Understanding the appropriate legal basis for processing (incl. consent)</li>
<li>Data Protection by design</li>
</ul>
<h3>3.   Module 3 – What do you need to put in place</h3>
<ul>
<li>Creating a simple Data Inventory</li>
<li>Establish what other documentation is required</li>
<li>What if it all goes wrong – what can the Data Protection Commission do</li>
</ul>
<h2>Duration:</h2>
<p>Each module is 60 minutes, including ample time for Questions and Answers.</p>
<h2>Audience:</h2>
<p>Staff, contractors or volunteers who have no or limited knowledge of data protection and specifically the GDPR legislation.</p>
<h2>Delivery Format:</h2>
<ul>
<li>Online – Presentation, using Google Meet (or your own online platform of choice).</li>
<li>In-person – Interactive workshop over the selected duration.</li>
</ul>
<h2>Also Included:</h2>
<ul>
<li>A link to a softcopy of any slides will be provided during the session.</li>
<li>Link to additional free resources would be included too.</li>
<li>Certificates of attendance if required.</li>
</ul>
<h2>Pricing:</h2>
<ul>
<li>Please see our website for our current prices:</li>
</ul>
<p style="padding-left: 40px;"><a href="https://www.l2cybersecurity.com/prices/">https://www.l2cybersecurity.com/prices/</a></p>
<h2>Contact us:</h2>
<p><a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a></p>
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://ie.linkedin.com/in/l2actual">LinkedIn</a>, <a href="https://infosec.exchange/@L2actual">Mastodon</a> and <a href="https://www.youtube.com/@L2actual/videos">YouTube</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/">LinkedIn</a>.</p>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/staff-data-protection-awareness-training/">Staff Data Protection Awareness Training</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Board Management Data Protection Briefing</title>
		<link>https://www.l2cybersecurity.com/board-management-data-protection-briefing/</link>
		
		<dc:creator><![CDATA[Liam]]></dc:creator>
		<pubDate>Mon, 30 Mar 2020 22:50:22 +0000</pubDate>
				<category><![CDATA[Services]]></category>
		<category><![CDATA[Board Data Protection]]></category>
		<category><![CDATA[Board Data Protection Briefing]]></category>
		<category><![CDATA[Board Management Data Protection Briefing]]></category>
		<category><![CDATA[Board of Directors]]></category>
		<category><![CDATA[Data Protection]]></category>
		<category><![CDATA[Data Protection Briefing]]></category>
		<category><![CDATA[Management Data Protection]]></category>
		<category><![CDATA[Management Data Protection Briefing]]></category>
		<category><![CDATA[Training]]></category>
		<guid isPermaLink="false">https://www.l2cybersecurity.com/?p=2110</guid>

					<description><![CDATA[<p>Board/Management Data Protection Briefing Download these details Make an enquiry L2 Cyber Security Solutions is delighted to be able to offer the following Board/Management Briefing, in an online and in-person format. Title: Data Protection Briefing for Boards or Management. Learning objective: The purpose of this programme is to equip the members of the board/management with the&#8230;</p>
<p>The post <a href="https://www.l2cybersecurity.com/board-management-data-protection-briefing/">Board Management Data Protection Briefing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></description>
										<content:encoded><![CDATA[<div class="fl-builder-content fl-builder-content-2110 fl-builder-content-primary fl-builder-global-templates-locked" data-post-id="2110"><div class="fl-row fl-row-fixed-width fl-row-bg-none fl-node-5ebc52ba7285c fl-row-default-height fl-row-align-center" data-node="5ebc52ba7285c">
	<div class="fl-row-content-wrap">
		<div class="uabb-row-separator uabb-top-row-separator" >
</div>
						<div class="fl-row-content fl-row-fixed-width fl-node-content">
		
<div class="fl-col-group fl-node-5ebc52eb93239" data-node="5ebc52eb93239">
			<div class="fl-col fl-node-5ebc52eb933e1 fl-col-bg-color fl-col-small" data-node="5ebc52eb933e1">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-heading fl-node-5ebc52feed684" data-node="5ebc52feed684">
	<div class="fl-module-content fl-node-content">
		<h1 class="fl-heading">
		<span class="fl-heading-text">Board/Management Data Protection Briefing</span>
	</h1>
	</div>
</div>
</div>
</div>
			<div class="fl-col fl-node-5ebc52eb933ec fl-col-bg-color fl-col-small" data-node="5ebc52eb933ec">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-pp-file-download fl-node-5ebc536edb0b9" data-node="5ebc536edb0b9">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="https://www.l2cybersecurity.com/wp-content/uploads/2023/10/Board-Management-Data-Protection-Briefing.pdf" target="_self" class="pp-button" role="button" download="Board-Management-Data-Protection-Briefing.pdf" aria-label="Download these details">
				<i class="pp-button-icon pp-button-icon-before fi-download"></i>
						<span class="pp-button-text">Download these details</span>
					</a>
</div>
	</div>
</div>
<div class="fl-module fl-module-pp-smart-button fl-node-5eea83e6d5e64" data-node="5eea83e6d5e64">
	<div class="fl-module-content fl-node-content">
		<div class="pp-button-wrap pp-button-width-auto pp-button-has-icon">
	<a href="mailto:info@l2cybersecurity.com?subject=Board/Management%20Data%20Protection%20Briefing%20enquiry%20&#038;body=Hi%20there,%0A%0AI%20would%20like%20to%20get%20more%20information%20about%20the%20Board/Management%20Data%20Protection%20Briefing,%20please.%0A" target="_blank" class="pp-button" role="button" rel="noopener" aria-label="Make an enquiry">
				<i class="pp-button-icon pp-button-icon-before ua-icon ua-icon-icon-6-mail-envelope-closed2"></i>
						<span class="pp-button-text">Make an enquiry</span>
					</a>
</div>
	</div>
</div>
</div>
</div>
	</div>

<div class="fl-col-group fl-node-5ebc52ba74e29" data-node="5ebc52ba74e29">
			<div class="fl-col fl-node-5ebc52ba7501e fl-col-bg-color" data-node="5ebc52ba7501e">
	<div class="fl-col-content fl-node-content"><div class="fl-module fl-module-rich-text fl-node-5ebc52ba7fe0c" data-node="5ebc52ba7fe0c">
	<div class="fl-module-content fl-node-content">
		<div class="fl-rich-text">
	<p><a href="https://www.l2cybersecurity.com/">L2 Cyber Security Solutions</a> is delighted to be able to offer the following Board/Management Briefing, in an online and in-person format.</p>
<h2>Title: Data Protection Briefing for Boards or Management.</h2>
<h2>Learning objective:</h2>
<p>The purpose of this programme is to equip the members of the board/management with the knowledge of their obligations for data protection, under the GDPR and have a strategy for addressing these in their organisation.</p>
<h2>Content of the Board/Management Briefing:</h2>
<ul>
<li>Overview of case studies since GDPR came into force in Ireland</li>
<li>Quick question – do you need a Data Protection Officer (DPO)?</li>
<li>An introduction of the organisation’s obligations</li>
<li>Outline an implementation strategy for the organisation</li>
</ul>
<h2>Duration:</h2>
<p>The briefing will take 45 minutes. There will be plenty of time for Questions and Answers.</p>
<h2>Audience:</h2>
<p>Board members or Senior Management of organisations that want to start the journey of implementing a data protection compliance regime.</p>
<h2>Delivery Format:</h2>
<ul>
<li>Online – Presentation, using Google Meet (or your own online platform of choice).</li>
<li>In-person – Interactive workshop over the selected duration.</li>
</ul>
<h2>Also Included:</h2>
<ul>
<li>A link to a softcopy of any slides will be provided during the session.</li>
<li>Link to additional free resources would be included too.</li>
<li>Certificates of attendance if required.</li>
</ul>
<h2>Pricing:</h2>
<ul>
<li>Please see our website for our current prices:</li>
</ul>
<p style="padding-left: 40px;"><a href="https://www.l2cybersecurity.com/prices/">https://www.l2cybersecurity.com/prices/</a></p>
<h2>Contact us:</h2>
<p><a href="mailto:info@L2CyberSecurity.com">info@L2CyberSecurity.com</a></p>
<h2>Follow us on Social media:</h2>
<p>Liam is available on <a href="https://ie.linkedin.com/in/l2actual">LinkedIn</a>, <a href="https://infosec.exchange/@L2actual">Mastodon</a> and <a href="https://www.youtube.com/@L2actual/videos">YouTube</a>.</p>
<p>Follow L2 Cyber on <a href="https://www.linkedin.com/company/l2cyber/">LinkedIn</a>.</p>
</div>
	</div>
</div>
</div>
</div>
	</div>
		</div>
	</div>
</div>
</div><div class="uabb-js-breakpoint" style="display: none;"></div><p>The post <a href="https://www.l2cybersecurity.com/board-management-data-protection-briefing/">Board Management Data Protection Briefing</a> appeared first on <a href="https://www.l2cybersecurity.com">L2 Cyber Security Solutions Ltd.</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
