Digital, Privacy & Cybersecurity

Digital, Privacy & Cybersecurity

The Digital, Privacy & Cybersecurity area has gained, throughout the years, a growing importance in TELLES. Our team of specialized lawyers is exclusively dedicated to providing excellent legal advice to its clients, whether public or private entities.

In times of digital transformation, the amount of data stored and traded, structured and non-structured, with no boundaries, has increased and will continue to increase in the next few years. New concepts and technologies are emerging and give rise to new realities such as cloud computing, mobility, internet of things (IoT), augmented reality/virtual reality, artificial intelligence, block chain, robotics, to which companies have to adapt. TELLES’ dedicated team is prepared to correspond to the needs of enhanced soundness, consistency and legal security regarding Data Protection, in order to build trust to the development of digital economy.

The Digital, Privacy & Cybersecurity area, among others, provides the following services:

  • Digital Contracts Negotiation | Information Technology (ex. Cloud computing contracts);
  • Privacy Clauses Negotiation;
  • Data Protection Consulting;
  • System and Technological Architecture evaluation regarding the rules of Personal Data Protection;
  • Adequacy projects to the GDPR (Regulation (EU) 2016/679 of the European Parliament and the Council, 27 of April of 2016, which will be applicable to all EU Member-States from the 25th of May);
  • Legal Audits of compliance with the Personal Data Protection legislation;
  • Evaluation and analysis of CRM projects, of loyalty programs and marketing campaigns;
  • Legal Counselling concerning the definition of business frameworks and launching of products and/or digital services (e-commerce);
  • Professional Training;
  • Data Protection Officer implementation;
  • Contracts concerning the provision of services for processing personal data;
  • International Data Transfer consulting;
  • Definition of Data Retention policies;
  • Definition of processes adequate to deal and solve data breaches.
Please note, your browser is out of date.
For a good browsing experience we recommend using the latest version of Chrome, Firefox, Safari, Opera or Internet Explorer.