Can new technologies improve healthcare?
Can new technologies improve healthcare?
New technologies are not inherently ethically good or bad; they can both enhance or violate fundamental rights and values and their use can have far-reaching consequences. This is especially apparent ...
Detecting identity fraud to reduce abuses and vulnerabilities
Detecting identity fraud to reduce abuses and vulnerabilities
Imagine an individual with a known criminal past has recently renewed his passport with a morphed image created by combining his own photo with that of another person without a ...
Unpicking the contradictions that facilitate tax crime
Unpicking the contradictions that facilitate tax crime
Trilateral Research is proud to work with our partners in PROTAX project, contributing to strengthening the prevention and prosecution of tax crimes in Europe. PROTAX has so far shown the ...
Using digital surveillance tools - what are the privacy and ethical issues to take into account?
Using digital surveillance tools – what are the privacy and ethical issues to take into account?
A variety of digital surveillance solutions are ready for use by law enforcement agencies (LEAs), such as advanced algorithms, network analysis, data mining and machine learning. Although the gathering and ...
SATORI standard, ethics assessment
The future of ethics assessment: contribute to SATORI’s European standard
How do we embed ethics in innovation? As innovations do not follow a fixed recipe, their development or use may raise ethical concerns or unintended consequences. A successful innovation must, ...
CESIUM early warning, early intervention
Develop better early intervention strategies to combat child exploitation – interview with Kay Wallace, Police and Justice lead for the NWG
In this interview with Kay Wallace the Police and Justice lead for the NWG – Exploitation Response Unit, we discuss how Project CESIUM supports a better understanding of risks and ...
E-learning platform, privacy
Providing safe educational technologies – a guide for educators
The current response to the Coronavirus is making massive changes to all our lives, but it’s also accelerating various existing trends. One of these has been to move education online, ...
Ethically designed technology_PREVISION
Ethically developed technology for safer societies – the PREVISION project case study
The European Union invests billions of Euros in security-related research: the 2018-2020 work programme envisaged a budget of more than €1 billion for tackling challenges such as (cyber)crime, terrorism, threats ...
TRIPS project
Giving voice to end-users’ needs in designing new transport systems
Trilateral Research joins 11 organisations from across Europe in the newly launched H2020 TRIPS project. The ambition of the project is to take practical steps to address and pre-empt discrimination against ...
Human Security
Why is human security important?
Never has the concept of human security been as important as it is today as the world responds to the global pandemic COVID-19, which broke out in Wuhan, China in ...
COPKIT webinar-darknet
A Knowledge Discovery tool to analyse darknet advertisements – Join COPKIT’s webinar
We are delighted to announce that on 22 April 2020 COPKIT will be having its second public webinar to introduce COPKIT’s Knowledge Discovery tool. In this webinar, our partners from the University of ...
NOFEAR COVID19 webinar
The response to COVID-19: a comparison of experiences in Europe
On Monday 9th March 2020 the NO-FEAR partners hosted a webinar discussing the response to the COVID-19 outbreak across four different countries – Italy, Spain, Israel and France. Approximately 500 participants ...
Bad AI_biased machine learning
AI for Good – Security Issues, Dangers and Implications of Smart Information Systems
While recent innovations in the machine learning domain have improved a variety of computer-aided tasks, machine learning systems present us with new challenges, new risks, and new avenues for attackers ...
Pandemics
Better communication for pandemics at all scales
While easy to make commentary about it, information remains a major challenge during pandemics. In part, this is because when a new disease emerges, authorities are almost automatically one step ...
World Water day
World Water Day – Celebrating the importance and vulnerability of the world’s water supplies
This Sunday 22 March, we are proud to celebrate World Water Day. This is an important day that highlights issues of water security and environmental justice throughout the world. World Water ...
Leading the way in protecting the most vulnerable – interview with Chief Superintendent Jon McAdam from Lincolnshire Police
Leading the way in protecting the most vulnerable – interview with Chief Superintendent Jon McAdam from Lincolnshire Police
Jon McAdam is Temporary Chief Superintendent at Lincolnshire Police currently working as Area Commander for the West area of the County overseeing serious crime investigations, response policing and neighbourhood policing ...
coronavirus
COVID-19 and Data Protection in Emergency Circumstances
As of today, the coronavirus COVID-19 is affecting 124 Countries and territories around the globe, calling governments and businesses worldwide to face an emergency situation that might continue for longer ...
child soldiers, justice
Bringing better justice to child soldiers
Trilateral Research is collaborating with the Universidad de La Sabana in the PATCH (Patterns of Child Recruitment in Colombia) project. The project aims to identify patterns and dynamics of recruitment ...

Outsourced DPO

See below a list of standard requirements for this service, however we are always available to tailor our services in relation to our clients' needs.

Contact us to discuss further.

Serve as your DPO

Company name and contact details transmitted to the ICO Company name and contact details available to:
  • Management
  • Employees
  • Data subjects
Article reference: 37

Contact point for data subjects

  • Contact data accessible on the websites and privacy notices
  • Function as the main public contact point (email & post)
  • Guide your organisation on the possible sources of data access requests.
Article reference: 38(4)

Contact point for Data Protection Authorities
(e.g. ICO)

Liaise with the ICO in case of issues with data subjects and data breaches.
Article reference: 39(1)(d), 39(1)(e), 36

Ad hoc advice on difficult data protection issues

Written opinions on data protection queries, with an analysis of relevant issues or other relevant legislative elements
Article reference: 39(1)(a)

Regular newsletter to inform and advise on relevant developments and possible challenges in data protection

Newsletter containing the latest regulatory news and compliance guidance, and news concerning conferences and training opportunities
Monthly
Article reference: 39(1)(a)

Annual gap analysis

Audit and gap analysis to map new activities and data-processing practices
Virtual
Article reference: 39(1)(b)

Status discussion (via phone/skype) and report

Discussion and report
Every 6 months
Article reference: 39(1)(b)

Review of the privacy notices

Review of the privacy notices to ensure accuracy and advice on how to improve
Article reference: 39(1)(b)

Provide advice to the client organisation on how to carry on data protection impact assessments (DPIA) and to monitor their performance

We provide advice on:
  • Whether to carry out a DPIA
  • The best methodology to follow
  • Whether to carry out the DPIA in-house or to outsource it depending on the complexity
  • What safeguards (including technical and organisational measures) to apply to mitigate any risks to the rights and interests of the data subjects
  • Whether the DPIA has been correctly carried out and whether its conclusions are in compliance with the GDPR
Article reference: 39(1)(c)

Oversee the establishment and maintenance of the Record of Processing Activities

  • Contact point for the designated employee
  • Guidance on the Record, including provision of check-lists, best practices, and methodological advice
Article reference: 39

Provide guidance on data breach handling and reporting

  • Contact point for the responsible person
  • Contact point for the ICO
  • Advice on best practices for handling data breaches, including notification requirements, reporting and identification of measures to limit damage
Article reference: 33(3)(b)

Monitor the data-protection-training activities and advise on their necessity

  • Inclusion of a chapter on training in the status reports
  • Provision of news and updates on relevant conferences and training courses (newsletter)
  • Provision of training materials, where appropriate
Article reference: 39(1)(b)

Email and telephone assistance

-
Article reference: -

Bespoke notifications to management on critical legislative, judicial, or policy developments that may impact your business

Email notification with explanation of the development and a preliminary overview of the impact on the organisation
Article reference: 39(1)(a)

Training seminar on the developments of data protection law and policy

-
Article reference: -

Review of the consistency of the internal documents concerning data processing practices

Cross-check of the consistency of the internal documents
Article reference: 39(1)(b)

Weekend and holidays data breach guidance

Data breach guidance during the weekends and holidays
Article reference: -

DPO Assist

See below a list of standard requirements for this service, however we are always available to tailor our services in relation to our clients' needs.

Contact us to discuss further.

Ad hoc advice on difficult data protection issues

Written opinions on data protection queries, with an analysis of relevant issues or other relevant legislative elements
Article reference: 39(1)(a)

Regular newsletter to inform and advise on relevant developments and possible challenges in data protection

Newsletter containing the latest regulatory news and compliance guidance, and news concerning conferences and training opportunities.
Monthly
Article reference: 39(1)(a)

Annual gap analysis

Audit and gap analysis to map new activities and data-processing practices
Virtual
Article reference: 39(1)(b)

Status discussion (via phone/skype) and report

Discussion and report
Annually
Article reference: 39(1)(b)

Review of the privacy notices

Review of the privacy notices to ensure accuracy and advice on how to improve.
Article reference: 39(1)(b)

Provide advice to the client organisation on how to carry on data protection impact assessments (DPIA) and to monitor their performance

We provide advice on:
  • Whether to carry out a DPIA
  • The best methodology to follow
  • Whether to carry out the DPIA in-house or to outsource it depending on the complexity
  • What safeguards (including technical and organisational measures) to apply to mitigate any risks to the rights and interests of the data subjects
  • Whether the DPIA has been correctly carried out and whether its conclusions are in compliance with the GDPR
Article reference: 39(1)(c)

Provide guidance on data breach handling and reporting

  • Contact point for the responsible person
  • Advice on best practices for handling data breaches, including notification requirements, reporting and identification of measures to limit damage
Article reference: 33(3)(b)

Monitor the data-protection-training activities and advise on their necessity

  • Inclusion of a chapter on training in the status reports
  • Provision of news and updates on relevant conferences and training courses (newsletter)
  • Provision of training materials, where appropriate
Article reference: 39(1)(b)

Email abd telephone assistance

-
Article reference: -

Bespoke notifications to the top management on critical legislative, judicial, or policy developments that may impact your business

Email notification with explanation of the development and a preliminary overview of the impact on the organisation
Article reference: 39(1)(a)

Compliance Support

See below a list of standard requirements for this service, however we are always available to tailor our services in relation to our clients' needs.

Contact us to discuss further.

Data Mapping

Map the data flows within your organisation to better understand how personal information flows between departments

Data Protection Impact Assessments

Where required by the GDPR or national law, conduct or review DPIAs using our library of good practices
Article reference: 35

Consent and Privacy Notice Requirements

Revise and improve consent and privacy notices to meet transparency and accoutnability requirements

Gap Analysis

Identify gaps in your organisation's compliance with the GDPR, national data protection legislation or sectoral legislation

Data Protection Audit

Audit your organisation's activities to assess your compliance with applicable data protection law

Data Protection-by-design and -default

Work with your technical and admin teams to operationalise Data Protection-by-design and -default, using established good practice
Article reference: 25

Training

We offer general, role-based (e.g., HR) and activity based (e.g., DPIA) training. All our training materials are designed to be accessible to non-experts and easy to use

General compliance support

Support for creating required documentation, including, but not limited to Records of Processing activities, Data retention (and deletion) schedules, Personal Data Breach procedures, Subject Access Request procedures, Training materials, Legitimate Interest Assessments, etc.)

‘Risk Assessment Report and Methodology’

You can view the Executive Summary and Table of contents of the Project Solebay Risk Assessment Methodology Report.

Please sign up to the Solebay mailing list to download the Full Solebay project report.