Understanding and Navigating SOC 2 Requirements In this blog, we will take a look at Service Organization Control (SOC 2) requirements and audits. Starting with a description of what SOC 2 is, we will then explore the different types and scopes of a SOC 2 compliance assessment. What is SOC 2? The SOC 2 security […]
Data Transfer Risk Assessment In our previous post on the Schrems II judgement, we explored the wider implications for transfering personal data between the EU and the US and the implications for the UK in a post-Brexit world. In this blog, we are focussing on transfer risk assessments (TRAs) and, having provided some of the […]
Necessary cookies enable core functionality such as security, network management and accessibility.
You may disable these by changing your browser settings, however, this may affect how the website functions.
We use advertising cookies to ensure we can provide you with the most relevant information about our services and products.
Google Analytics cookies help us improve our website by collecting and reporting information on how you use it.
The cookies collect information in a way that does not directly identify anyone.
Functional and performance cookies are required in order for certain parts of the website to work such as video and audio content.