Data Protection & Technology

Our members are known for their skill in handling all areas of data protection and technology law.

Working within Red Lion Chambers’ nationally-respected Business Crime & Fraud team, we are known for our skill in all areas of data protection and technology disputes.

Members of Chambers are particularly respected for work in relation to criminal offences under GDPR. Acting for both companies and individual directors, this work ranges from charges of not having properly controlled and managed personal data through to failure to provide data and matters relating to consent.

Red Lion Chambers’ data protection and technology barristers are also highly-respected for their work on behalf of both companies and individuals in relation to social media offences, such as harassment, stalking, trolling and ‘revenge porn’ and crimes under the Computer Misuse Act, including computer hacking, the release and theft of private information, obtaining articles for use in computer misuse offences and doing unauthorised acts to impair computer operation (ie virus release). Members of Chambers also have expertise in handling charges relating to the download or possession of indecent images.

As one of the leading Fraud chambers our barristers are experts in cyber-enabled fraud. This can take the form of online bank frauds, identity thefts and phishing, where seemingly genuine communications are sent to encourage the disclosure of personal information.

Increasingly, our barristers are working on cases involving cryptoassets. This specialism includes acting for individuals and companies in relation to Restraint, Civil Recovery & Confiscation of cryptoassets, freezing orders and wider cryptoasset Fraud. We are also able to advise on matters relating to the regulatory aspects of cryptoassets, in particular anti-money laundering requirements, source of fund checks, suspicious activity and its reporting.

  • Our data protection and technology expertise includes:
  • GDPR offences
  • fraudulent online scams
  • data theft by former employees
  • cryptoasset freezing
  • cryptoassets and anti-money laundering requirements
  • social media or cyber-enabled harassment, stalking, blackmail and extortion
  • the download and possession of indecent images of children.