Trustpilot
Account
Create account
Your account
Your subscriptions
Your downloads
Your orders
Training course bookings
Self-paced training bookings
E-learning course bookings
CyberComply portal
GRC e-learning platform
DocumentKits platform
Basket
United Kingdom
Select regional store:
USA
EU
Asia Pacific
£ GBP
+44 (0)333 800 7000
Shop
Shop by product
BS 10012 PIMS
Business continuity management (BCM) and ISO 22301
CEH
CGEIT, CISA, CISM, CISSP and CRISC
COBIT®
Cloud security
CyberComply
Cyber Essentials
Cyber incident response
Cyber resilience
Cyber security
Cyber security as a service (CSaaS)
Cyber Safeguard
DORA
DSP Toolkit
Gambling Commission
GDPR and data protection
Information security
ISO 27001
ISO 27701
ITIL®
IT governance
Management system standards
NIS Directive and NIS Regulations
PCI DSS
Penetration testing
Project management
Risk management
SOC 2
Shop by category
Latest products and services
Training courses
E-learning and staff awareness
Exam Vouchers
Toolkits
Software
Penetration testing
Vulnerability scanning
Consultancy services
Books and audiobooks
Standards
Templates
Self-assessment tools
Data Privacy
Shop by subject
BS 10012 PIMS
DPO as a service (DPOaaS)
DSP Toolkit
GDPR and data protection
GDPR compliance solutions
Information security
ISO 27701
Legal services
PECR
Data privacy information pages
Brexit and data protection
BS 10012 PIMS
Cyber Defence in Depth
Data breaches
Data Protection Staff Awareness
DPA (Data Protection Act) 2018
DPO role under the GDPR
DSP Toolkit
EU ePR (ePrivacy Regulation)
Europrivacy
GDPR
GDPR compliance solutions
Information security
ISO 27701
Official Crown Commercial Service Provider
PECR
Privacy as a Service
UK data protection law
Useful links
Cyber Defence in Depth
Leave your feedback
Become an IT Governance partner
Apply for a corporate account
Data privacy free resources
GDPR compliance tool for schools
Speak to a GDPR expert
In-house training options
Cyber Security
Shop by subject
Business continuity management (BCM) and ISO 22301
Certified ethical hacker (CEH)
Cloud security
Cyber Essentials
Cyber incident response
Cyber resilience
Cyber security
Information security
ISO 27001
IT governance
NIS Directive and NIS Regulations
PCI DSS
Penetration testing
Risk management
Cyber security information pages
Business continuity (BCM) and ISO 22301
CMMC
Cyber Defence in Depth
Cyber Essentials
Cyber incident response
Cyber resilience
Cyber security
DORA
Information security
ISO 27001
IT governance
ITIL®
Management system standards
NIS Directive and NIS Regulations
Official Crown Commercial Service Provider
PCI DSS
Penetration testing & ethical hacking
Risk management
SOC 2
Social engineering attacks
SWIFT CSCF
Useful Links
Cyber Defence in Depth
20 years of IT Governance
In-house training options
£10 for your feedback
Become an IT Governance partner
Cyber security free resources
Speak to a cyber security expert
Free cyber security assessment
Training
Shop by subject
Business continuity (BCM) & ISO 22301
BS 10012 PIMS
CGEIT, CISA, CISM, CISSP and CRISC
Cloud security
COBIT
®
Cyber security & ethical hacking
DORA
GDPR and data protection
Incident response management
Information security
ISO 27001
ITIL
®
Microsoft
PCI DSS
Risk management
Training information pages
Business continuity (BCM) & ISO 22301
BS 10012 PIMS
CGEIT, CISA, CISM, CISSP and CRISC
CISSP and CCSP
COBIT
®
Cyber security
DORA training overview
DORA training pathways
Ethical hacking
GDPR and data protection
Information security
ISACA courses
ISO 27001
ITIL
®
MOD ELCAS scheme
Microsoft
Official Crown Commercial Service Provider
PCI DSS
Useful links
Learning paths
Learn from anywhere with IT Governance
In-house training options
£10 for your feedback
Become an IT Governance partner
Apply for a corporate account
Training free resources
Speak to a training expert
Staff Awareness
Shop by subject
Remote working
Phishing
Business Continuity & ISO 22301
Cyber security
GDPR and data protection
Information security
ISO 27001
PCI DSS
SCORM packages
Training aids
Shop all staff awareness
Staff awareness information pages
Staff awareness e-learning
Multi-course training suites
Data Protection Staff Awareness
Staff awareness training
Customised staff awareness courses
Security awareness programme
Staff Awareness Course Fulfilment
SCORM Packages
Ways to buy
Useful links
GRC eLearning platform
Staff awareness free resources
E-learning FAQs
Official Crown Commercial Service Provider
£10 for your feedback
Apply for a corporate account
Become an IT Governance partner
Request a tailored e-learning quote
Speak to an e-learning expert
Consultancy
Shop by subject
Business continuity (BCM) & ISO 22301
BS 10012 PIMS
Cloud security
Cyber Essentials
Cyber incident response
Cyber security
Data security and protection (DSP) toolkit
DPO as a service
Gambling Commision compliance
GDPR and data protection
ISO 27001
PECR
PCI DSS
Management system standards
NIS Directive and NIS Regulations
Shop consultancy by the hour
Consultancy information pages
Business Continuity (BCM) & ISO 22301
BS 10012 PIMS
CISO as a service (CISOaaS)
Cyber Essentials
Cyber incident response
Cyber security
Data security and protection (DSP) toolkit
DPO as a service (DPOaaS)
Gambling Commision compliance
GDPR and data protection
ISAE 3402, SSAE 16, SOC 2 and 3
ISO 27001
IT governance, ISO 38500 and COBIT
®
NIS Directive and NIS Regulations
Official Crown Commercial Service Provider
PECR
PCI DSS
SWIFT CSCF
Useful links
Cyber Defence in Depth
Consultancy services overview
Corporate and enterprise consultancy
Consultancy case studies
£10 for your feedback
Apply for a corporate account
Become an IT Governance partner
Speak to a consultancy expert
Free cyber security assessment
Security Testing
Shop by subject
Certified ethical hacker (CEH)
Cloud security
Cyber Essentials
PCI DSS
Penetration testing
Security testing information pages
The Cyber Essentials scheme
Cyber Essentials solutions
Penetration testing
Penetration testing services
Ethical hacking
Official Crown Commercial Service Provider
PCI DSS
PCI DSS services
Security testing
Security awareness programme
Vulnerability scanning
Useful links
Cyber Safeguard
Cyber Defence in Depth
Information security for hybrid working
£10 for your feedback
Security testing free resources
Apply for a corporate account
Become an IT Governance partner
Speak to a security testing expert
Tools
Shop toolkits
Business continuity (BCM) and ISO 22301
Cloud security
Cyber Essentials
Cyber resilience
Cyber security
Data security and protection (DSP)
GDPR and data protection
ITSM, ITIL® 4 & ISO 20000
IT governance
ISO 27001
Management Systems Standards
PCI DSS
Shop all toolkits
Shop software
CyberComply
vsRisk
Data Flow Mapping Tool
Compliance Manager
DPIA Tool
GDPR Manager
Vulnerability scanning
GDPR.co.uk
Shop all software
Useful links
CyberComply login
DocumentKits login
Tools and software solutions
Documentation Toolkits
What is DocumentKits?
Documentation toolkit FAQs
Cyber Defence in Depth
£20 for your feedback
Apply for a corporate account
Become an IT Governance partner
Speak to a toolkit expert
Speak to a software expert
Secure your business from cyber threats this winter. Test your vulnerabilities now. Find out more
Data privacy solutions
GDPR (General Data Protection Regulation)
Articles of the GDPR
Articles of the GDPR
Further information
Europrivacy
Privacy as a Service
6 years of the GDPR
New rules on data protection
GDPR compliance checklist
GDPR training courses
GDPR online training
GDPR Compliance Solutions
GDPR and data protection consultancy
The DPO (data protection officer) role
GDPR penalties
DSARs (data subject access requests)
GDPR data flow mapping
GDPR data protection impact assessment (DPIA)
The GDPR and privacy compliance frameworks
GDPR compliance audit
GDPR compliance solutions
GDPR and information security
GDPR FAQs
Articles of the GDPR
Become an IT Governance partner
Speak to a GDPR expert
Chapter I – General provisions
Article 1 –
Subject-matter and objectives
Article 2 –
Material scope
Article 3 –
Territorial scope
Article 4 –
Definitions
Chapter II – Principles
Article 5 –
Principles relating to processing of personal data
Article 6 –
Lawfulness of processing
Article 7 –
Conditions for consent
Article 8 –
Conditions applicable to child’s consent in relation to information society services
Article 9 –
Processing of special categories of personal data
Article 10 –
Processing of personal data relating to criminal convictions and offences
Article 11 –
Processing which does not require identification
Chapter III – Rights of the data subject
Section 1 - Transparency and modalities
Article 12 –
Transparent information, communication and modalities for the exercise of the rights of the data subject
Section 2 - Information and access to personal data
Article 13 –
Information to be provided where personal data are collected from the data subject
Article 14 –
Information to be provided where personal data have not been obtained from the data subject
Article 15 –
Right of access by the data subject
Section 3 - Rectification and erasure
Article 16 –
Right to rectification
Article 17 –
Right to erasure (‘right to be forgotten’)
Article 18 –
Right to restriction of processing
Article 19 –
Notification obligation regarding rectification or erasure of personal data or restriction of processing
Article 20 –
Right to data portability
Section 4 - Right to object and automated individual decision-making
Article 21 –
Right to object
Article 22 –
Automated individual decision-making, including profiling
Section 5 - Restrictions
Article 23 –
Restrictions
Chapter IV – Controller and processor
Section 1 - General obligations
Article 24 –
Responsibility of the controller
Article 25 –
Data protection by design and by default
Article 26 –
Joint controllers
Article 27 –
Representatives of controllers or processors not established in the Union
Article 28 –
Processor
Article 29 –
Processing under the authority of the controller or processor
Article 30 –
Records of processing activities
Article 31 –
Cooperation with the supervisory authority
Section 2 - Security of personal data
Article 32 –
Security of processing
Article 33 –
Notification of a personal data breach to the supervisory authority
Article 34 –
Communication of a personal data breach to the data subject
Section 3 - Data protection impact assessment and prior consultation
Article 35 –
Data protection impact assessment
Article 36 –
Prior consultation
Section 4 - Data protection officer
Article 37 –
Designation of the data protection officer
Article 38 –
Position of the data protection officer
Article 39 –
Tasks of the data protection officer
Section 5 - Codes of conduct and certification
Article 40 –
Codes of conduct
Article 41 –
Monitoring of approved codes of conduct
Article 42 –
Certification
Article 43 –
Certification bodies
Chapter V – Transfers of personal data to third countries or international organisations
Article 44 –
General principle for transfers
Article 45 –
Transfers on the basis of an adequacy decision
Article 46 –
Transfers subject to appropriate safeguards
Article 47 –
Binding corporate rules
Article 48 –
Transfers or disclosures not authorised by Union law
Article 49 –
Derogations for specific situations
Article 50 –
International cooperation for the protection of personal data
Chapter VI – Independent supervisory authorities
Section 1 - Independent status
Article 51 –
Supervisory authority
Article 52 –
Independence
Article 53 –
General conditions for the members of the supervisory authority
Article 54 –
Rules on the establishment of the supervisory authority
Section 2 - Competence, tasks and powers
Article 55 –
Competence
Article 56 –
Competence of the lead supervisory authority
Article 57 –
Tasks
Article 58 –
Powers
Article 59 –
Activity reports
Chapter VII – Cooperation and consistency
Section 1 – Cooperation
Article 60 –
Cooperation between the lead supervisory authority and the other supervisory authorities concerned
Article 61 –
Mutual assistance
Article 62 –
Joint operations of supervisory authorities
Section 2 - Consistency
Article 63 –
Consistency mechanism
Article 64 –
Opinion of the Board
Article 65 –
Dispute resolution by the Board
Article 66 –
Urgency procedure
Article 67 –
Exchange of information
Section 3 - European data protection board
Article 68 –
European Data Protection Board
Article 69 –
Independence
Article 70 –
Tasks of the Board
Article 71 –
Reports
Article 72 –
Procedure
Article 73 –
Chair
Article 74 –
Tasks of the Chair
Article 75 –
Secretariat
Article 76 –
Confidentiality
Chapter VIII – Remedies, liability and penalties
Article 77 –
Right to lodge a complaint with a supervisory authority
Article 78 –
Right to an effective judicial remedy against a supervisory authority
Article 79 –
Right to an effective judicial remedy against a controller or processor
Article 80 –
Representation of data subjects
Article 81 –
Suspension of proceedings
Article 82 –
Right to compensation and liability
Article 83 –
General conditions for imposing administrative fines
Article 84 –
Penalties
Chapter IX – Provisions relating to specific processing situations
Article 85 –
Processing and freedom of expression and information
Article 86 –
Processing and public access to official documents
Article 87 –
Processing of the national identification number
Article 88 –
Processing in the context of employment
Article 89 –
Safeguards and derogations relating to processing for archiving purposes in the public interest, scientific or historical research purposes or statistical purposes
Article 90 –
Obligations of secrecy
Article 91 –
Existing data protection rules of churches and religious associations
Chapter X – Delegated acts and implementing acts
Article 92 -
Exercise of the delegation
Article 93 -
Committee procedure
Chapter XI – Final provisions
Article 94 –
Repeal of Directive 95/46/EC
Article 95 –
Relationship with Directive 2002/58/EC
Article 96 –
Relationship with previously concluded Agreements
Article 97 –
Commission reports
Article 98 –
Review of other Union legal acts on data protection
Article 99 –
Entry into force and application
PROTECT YOUR
BUSINESS
THIS WINTER