by Laura Spencer Laura Spencer No Comments

Continuing Professional Development (“CPD”) Webinars

Anson Evaluate are back with a brand new series of premium Continuous Professional Development (“CPD”) webinars.

These webinars are available and suitable for all and will be focused on the following subject areas:

  1. Cyber security, including ransomware, targeted cyber fraud, cyber breach response and best defences.
  2. Data Protection, including data protection in the UK post Brexit, analysis of data protection enforcement by regulators, international data transfers, Data Protection Impact Assessments (“DPIA”) and data subject rights. 
  3. Digital Economy, including libel, business promotion, Digital Technology Market Regulation as well as Blockchain, Cryptocurrency and NFTs.

Heather Anson, Anson Evaluate’s managing director, will be working up with Digital Law’s managing director Peter Wright to deliver these webinars to you in 3 rounds, beginning on 5th May 2022.


£45 per webinar (per organisation).

Discounted prices are available for those who purchase the full round of webinars, for example all 4 Cyber Security webinars (Ransomware, Targeted Cyber Fraud, Cyber Breach Response and the Best Defence).

> For each full webinar round £145.

> For all 3 webinar rounds (12 singular webinars) £395.

Please note that the full courses are not available for purchase directly through the platform therefore, if you would like to purchase a full round or all 3 rounds please email for more information.

Registration for each webinar is listed below its respective title and description.
For more information and to register your interest, email us at

Round 1 – Cyber Security (total of 4 webinars)

Webinar 1: Ransomware (5th May 2022)

The first recorded example of ransomware was in the late 1980’s which proves that ransomware isn’t anything new. However, over the last 3 years alone there has been a drastic rise in the number of companies who have fallen victim to ransomware attacks. Not only have such attacks become more common, they have also become a lot more sophisticated, even since the commonly known WannaCry and NotPetya attacks back in 2017. 

This webinar aims to take real life case studies as well as expert knowledge to better your companies response and defence mechanisms to such attacks. As well as this, the webinar will answer the following key questions:

  1. What are the drivers behind the growth in ransomware attacks?
  2. What should boards be doing to manage the risk from ransomware attacks?
  3. Should you feed the “beast” and pay the ransom?
  4. In the case of a ransomware breach response, who do you need to do and who do you need to notify?
  5. What counter measures and proposals have been put forward by governments and legislators around the world?

Webinar 2: Targeted Cyber Fraud (12th May 2022)           

According to official statistics from the National Cyber Security Centre (“NCSC”) in their 2021 Cyber Security Breaches Survey, the most common by far are those commonly known as phishing attacks, followed by impersonation. Both of these attacks fit into the targeted cyber fraud category.

As well as referring to real life case studies of companies/firms like yourself who have been the target of such attack, this webinar will focus on the following: 

  • The different modes of attack including email, SMS, instant messaging and social media.
  • How to spot a potentially fraudulent communication.
  • What to do if the worst happens, including law enforcement and notification.
  • The best methods of defence.

Webinar 3: Cyber Breach Response (19th May 2022)

The previous 2 webinars in this cyber security series have focused on the impact cyber security attacks can have as well as preventative measures that can be implemented to avoid such attacks being successful. However, this webinar will focus on your response should the worst case scenario occur and will cover the following key points:

  • Case studies, including examples of some of the best and worst cyber breach responses.
  • What needs to be in your breach response plan.
  • Testing and simulation of your breach response plan.
  • When a cyber breach should be communicated and who with, for example, internal comms, customers, clients and wider PR.
  • Cyber liability and insurance.
  • Working with law enforcement.
  • Legal and regulatory risks and responsibilities.

Webinar 4: Best Defence (26th May 2022)

Having technical security measures and systems in place, as well as staff awareness and training, are some of the best defence measures of any cyber security attack. This webinar will look at real life case studies of companies that have managed to limit the impact of such attacks based on the strategies they have implemented, whilst also covering the following key points:

  • Cyber policies, procedures and internal governance.
  • Identifying risks and pinch points.
  • The risks associated with remote working and working from home.
  • Technical security measures and systems that can be implemented to reduce risk.
  • Insurance.
  • War games.
  • Training and assessment.

Round 2 – Data Protection (total of 4 webinars)

Webinar 1: Data Protection Regulation in the UK Post Brexit (Date TBC)

The General Data Protection Regulation (“GDPR”) is incorporated into UK law by the UK Data Protection Act 2018 (“DPA’18”). Consequently, the principles of GDPR still apply in the UK despite the UK’s departure from the European Union (“EU”) at the very end of 2020. This means that compliance with data protection hasn’t really changed since Brexit except for when it comes to data sharing and data transfers to and from the EU. This webinar will first summarise the UK GDPR and DPA’18, including discussing its key principles, before moving on to covering the following points:

  • The EU-UK Data Adequacy Decision from the European Commissioner.
  • The Information Commissioners Role (“ICO”) in regulation and enforcement of data protection in the UK. 
  • An introduction to Codes of Conduct.
  • UK Departure of Culture, Media and Sport consultation “Data: a new direction” and the UK National Data Strategy.

Webinar 2: International Data Transfers – EU, US and the rest of the world (Date TBC)

Webinar 1 focuses on data transfers to and from the EU since Brexit. However, this webinar goes beyond this, discussing both transfers to and from the UK as well as the rest of the world. Therefore, this webinar will cover the following key points:

  • The implications Brexit has had on data transfers, including the EU-UK Data Adequacy decision from the European Commissioner.
  • Schrems II decision and the implications it had on the EU-US Privacy Shield.
  • An introduction to Data Transfer Agreements, including how and when they should be used, as well as what they need to contain.
  • An overview of Standard Contractual Clauses (“SCCs”), Binding Corporate Rules (“BCRs”) and Codes of Conduct.

Webinar 3: What goes into a Data Protection Impact Assessment (“DPIA”)? (Date TBC)

DPIA’s are an important part of risk assessment and analysis when it comes to launching a new business venture or simply carrying out a new processing activity. This webinar will not only discuss what a DPIA is and when it should be carried out, it will go into detail about the different topic areas that should be included in a DPIA.

The key points this webinar will cover are as follows:

  • When a DPIA should be carried out.
  • What a DPIA should include.
  • The purposes of and reasons for carrying out a DPIA, including discovery and assessment, and identifying and reducing risks.
  • Ownership and responsibility of the DPIA carried out as well as what to do with its recommendations.
  • Recommendations when it comes to the ongoing regular review and updating of your risk management system.

Webinar 4: Data Subject Rights (Date TBC)

Under the GDPR and DPA’18 all data subjects have a range of rights relating to the processing of their personal data. This webinar will look at each of these rights in turn before moving onto discussing how each of these rights should be responded to, including the following key points:

  • An overview of the 5 main rights a data subject has.
  • How to answer a Subject Access Request as well as the fair and reasonable use of exemptions.
  • How to ensure the right of rectification is performed correctly.
  • How to demonstrate the “right to be forgotten” in practice.
  • How and when to apply the right to data portability.
  • How to respond to a request for the restriction of processing.
  • Other rights regarding automated decision making including profiling.

Round 3 – Digital Economy (total of 4 webinars)

Webinar 1: Libel (Date TBC)

Where exactly do users stand with comments they make on social media? Cases over the last decade in the UK suggest that you are not free to say absolutely anything you like. While some users fall foul of the Terms of Service operated by social media companies and find their accounts blocked, some litigants with deep pockets have taken those who have made comments that they felt were libelous to court and in many instances have won. Consequently, it is important to think carefully before posting a tweet or making a comment on Facebook but evidence suggests that this message is still not filtering through to the majority of users. This webinar will explore the law as it stands with reference to leading cases and key legislation as well as posts that have featured cases before the employment tribunal.

  • Examples of libel cases, including Arlene Foster and Christian Jessen.
  • How did we get here? – the landmark cases of The Lord McAlpine of West Green v Sally Bercow.
  • Posts and the police – Offences under The Communications Act.
  • Examples of social media posts ending up in the employment tribunal.

Webinar 2: Business Promotion (Date TBC)

Marketing through social media remains the cheapest and easiest way to target potential customers in volume and has become a valuable promotional tool for many businesses. However, the potential legalities surrounding its use are significantly more complex than more traditional forms of marketing that used to involve advertising agencies, newspapers and tv. Cutting out the middle man advertising agent means that a business may run an advert or sponsored post that could fall foul of anything from advertising standards regulation to contravening basic copyright law. This webinar will explore examples of businesses that got it wrong and in some cases have destroyed their reputations through social media posts that went wrong, as well as some of the problems that can arise when high profile celebrities recommend a product or service.

  • Social media business pages, content and ownership.
  • Preserving digital copyright.
  • Handling online customer reviews and ratings.
  • Disputes with social media platforms.
  • Celebrity product use and endorsements

Webinar 3: Digital Technology Market Regulation (Date TBC)

  • EU Digital Markets Act  (“DMA”)
  • EU Digital Services Act (“DSA”)
  • Regulation and Enforcement under DMA & DSA in EU member states
  • UK Digital Technology Market Regulation – Competition and Markets Authority (“CMA”)

Webinar 4: Blockchain, Cryptocurrency, NFTs (Date TBC)

  • What is Blockchain?
  • Definition of a Cryptocurrency
  • Cryptocurrency Regulation
  • Non-Fungible Tokens

Meet the Speakers!

Dr. Heather Anson

Heather is Managing Director of Anson Evaluate Ltd, a specialist Regulatory Compliance and Training Provider in the UK. Anson Evaluate provides a range of compliance services including assessments and training. She believes in training as a key to compliance and provides this service through a variety of in person training seminars, webinars, online e-learning courses and podcasts. Her company clients include a wide range of corporations advising on regulatory matters across multiple jurisdictions in Europe, the United States, Middle East, China and Malaysia. Heather is also a specialist Consultant for the niche law firm Digital Law UK.

Peter Wright

Peter is a solicitor and leading expert in Data Protection, Cyber Security Regulation and Social Media Law. As Managing Director of Digital Law, he has been advising clients across the UK, US, Europe, Middle East and Asia for over a decade. He is the former Chair of the GDPR Working Group of the Law Society of England and Wales and is also a form Chair of the Technology and Law Committee of the Law Society. He is also author of the Law Society Cyber Security Toolkit and has co-authored a manual on practical GDPR compliance.

by Laura Spencer Laura Spencer No Comments

Docassemble Showcase Recording

On the 25th February Anson Evaluate with the aid of Tonic Workflows and Sheffield Legal Hackers hosted a showcase – celebrating ‘Access to Justice’ projects which had been worked on by those involved in the ‘Free Course: Build an A2J tool using Docassemble’.

Projects from the A2J Docassemble course included groups exploring revenge pornography, domestic abuse as well as asylum seekers. Each project would begin in the research stage, in order to understand what the unmet legal need was exactly; leading on from this research, groups began to design and plan apps or software which could be used as a basis to meet the legal need. From here groups used the Docassemble platform to build their project in code format. Finally each group has presented their A2J topic and demoed their Docassemble software in front of the other A2J groups as well as a virtual panel. The recording of the showcase held in February is linked below.