Add a bookmark to get started

Computer and plant to illustrate Data Privacy and Cybersecurity

Global advice to solve complex security and privacy challenges

Navigating the intricate web of data protection, privacy and cybersecurity issues is critical to your business. Our global Data Protection, Privacy and Security practice is renowned for providing leading advice. With 180+ professionals in 40+ countries, we have the geographic footprint and experience to help you solve your most pressing problems and be ready for future threats.
We support clients with some of the most complex and high-profile privacy and cybersecurity matters globally; from innovative product pipelines, to handling security incidents in multiple countries and responding to regulators or enforcement requests. And because long-term resilience is crucial, we also help build governance and sustainability programs that go beyond compliance.

“DLA Piper is top-notch at providing risk-based legal analysis in many jurisdictions around the world.”

Client, Chambers USA 2022

Our approach is innovative, combining proven methodologies, technology, tools and practical advice to solve problems and preemptively spot future threats. We have a team of highly experienced cybersecurity, privacy risk and technology consultants, many with Big 4 consultancy backgrounds, who work closely with our lawyers. This means our clients benefit from a blend of management consultancy, technical skills and legal insight to protect project materials, communications, and work product under attorney-client privilege. And with lawyers focusing on enforcement, government affairs, OFAC/sanctions, litigation, government contracting, SEC disclosures, and insurance, our support is comprehensive.

Clients in a wide range of regulated and non-regulated sectors turn to us for guidance, from local startups to some of the largest and best-known multinationals in the world. And we’ve helped many of the most influential governmental agencies, including the lead expert witness on US law by the Irish Data Protection Commissioner in Schrems II.

We shape privacy and security laws globally. We’ve provided input on every piece of major US state consumer privacy, biometrics, breach notice, and student privacy legislation that has been put forward. And members of our practice have written many of the definitive privacy and security books. These include Information Security and Privacy: A Guide to Federal and State Law and Compliance and Information Security and Privacy: A Guide to International Law and Compliance, collectively a 6,000-page, three-volume treatise that examines all aspects of privacy and security laws, published by Thomson-West.

Our practical, risk-based guidance will help you collect, manage and unlock value from data lawfully and in line with privacy rights, wherever you operate.


In Chile

Our team in Chile is experienced in drafting, reviewing, and adapting terms and conditions that include data protection clauses (apps, platforms, and software providers, employers, and public authorities); privacy policies for the use towards customers, employees, and visitors; and data privacy agreements, including data processing or joint controller agreements.

Also, we can help clients design business models in compliance with data protection regulations and provide them with an analysis of legislative initiatives that may affect data protection laws and data processing operations of clients in practice.

Further, we can offer our clients well-founded and experienced advice on applying and implementing the GDPR, adapting nationally and internationally used documents, and developing uniform data protection guidelines for multinational companies.

Awards and recognition

Contact

Data transfer tool

Transfer

Global data transfer methodology

Transfer has been developed to streamline the process of carrying out TIAs, providing a clear step-by-step methodology so data exporters and importers can assess problematic laws and practices in “third countries”, the level of safeguards in place and the severity and likelihood of harm as a result of public authority access.

Find out more
Print