Skip to Content

2013 DIFC Courts Code of Conduct Post-Migration

2013 DIFC Courts Code of Conduct Post-Migration

October 26, 2013

image_pdfimage_print

The Revised DIFC Courts Code of Conduct includes a number of provisions which have been migrated from the Code of Best Legal Professional Practice released in March 2013. It is open for consultation for a period of one month and the public is invited to send their feedback to the consultation email address (consultation@difccourts.ae) before 5pm on 26 October 2013.

Code of Conduct Post-Migration —No longer available – Consultation period over

X

Privacy Policy

The Dispute Resolution Authority and all its affiliates are committed to preserve the confidentiality, integrity and availability of client data and personal information.

Dispute Resolution Authority and all its affiliates employees, vendors, contract workers, shall follow Information Security Management System in all the processes and technology.

  1. DRA's Top Management is committed to secure information of all our interested parties.
  2. Information security controls the policies, processes, and measures that are implemented by DRA in order to mitigate risks to an acceptable level, and to maximize opportunities in order to achieve its information security objectives.
  3. DRA and all its affiliates shall adopt a systematic approach to risk assessment and risk treatment.
  4. DRA is committed to provide information security awareness among team members and evaluate the competency of all its employees.
  5. DRA and all its affiliates shall protect personal information held by them in all its form.
  6. DRA and all its affiliates shall comply with all regulatory, legal and contractual requirements.
  7. DRA and all its affiliates shall provide a comprehensive Business Continuity Plan encompassing the locations within the scope of the ISMS.
  8. Information shall be made available to authorised persons as and when required.
  9. DRA’s Top Management is committed towards continual improvement in information security in all our processes through regular review of our information security management system.