ICTLC – ICT Legal Consulting – ICT Cyber Consulting

In April 2021, ICTLC S.p.A. was born. ICTLC S.p.A.’s services cover compliance (Privacy, IP, TMT) and governance, organisation, management and control models. We also accompany clients in the creation and implementation of international IT security frameworks. ICTLC S.p.A. delivers legal and cybersecurity training programmes consisting of both classroom and distance learning on our proprietary legal-tech platform; acts as your DPO or CISO in outsourcing; and carries out second party legal and technological audits using the skills of both the law firm and our cyber team.

      ICT Legal Consulting is a law firm founded in 2011 with offices in Milan, Bologna, Rome, Amsterdam, Helsinki, Madrid, Melbourne. Through professional partnerships the firm is present in 33 other countries (Albania, Austria, Belgium, Brazil, Bulgaria, Canada, China, Czech Republic, Denmark, France, Germany, Greece, Hungary, Ireland, Japan, Luxembourg, North Macedonia, Mexico, Moldova, New Zealand, Nigeria, Poland, Portugal, Romania, Russia, Singapore, Slovakia, South Africa, Sweden, Switzerland, Turkey, United Kingdom and the United States).
ICTLC – ICT Legal Consulting was founded by Paolo Balboni and Luca Bolognini who have assembled a team of highly skilled and trusted professionals specialised in the fields of Information, Communication, Privacy and Technology law.

       ICT Cyber Consulting was born as a spin-off of ICTLC – ICT Legal Consulting, with the aim of providing guidance, assistance and quality services to companies and to entities in terms of cybersecurity, technology and data protection. The security of data and information, particularly where new technologies are involved, is an integral part of requirements of the utmost importance, that derive from numerous and diverse norms. Not only because of the GDPR (EU General Data Protection Regulation) and the NIS (Network and Information Security) Regulations, but also in regard to the field of trade and industrial secret, which always require setting major attention and effort in particular towards the levels of adequacy of ICT security.