Privacy – Cyber Security – Blockchain

Blockchain and the internet of value

Blockchain is the enabling technology that improves the operating models of the industry, optimizing transactions along the supply chain, managing and verifying users’ identities, administering and managing payments between businesses and consumers, reducing transaction costs and time to transfer money. It is a shared, decentralized, distributed, immutable, transparent and encrypted database with precise security rules, which records all resources and transactions through a peer-to-peer network.

The database is open to all participants, except for cases of private blockchain, replicated on every computer that uses the network, which can only be changed with the consent of all participants, who can see everything at any time. Until now we have considered that only institutions, political and economic, such as banks, companies and governments, could act as tools to reduce uncertainty and allow exchanges of value or information. Centralization by a single authority or entity means that we must trust these authorities to maintain order and structure within the dimension in which they operate.

This trust is violated when those central authorities can not maintain that order and structure. This accesses, for example, when we suffer the theft of data from our credit card from a bank database with which we have a current account. It is clear that the centralization of information in the bank where your data was stolen has been used against you. Technology and centralized data create a security risk. Today, thanks to the blockchain, uncertainty can be reduced without having to rely on a third party. In fact, thanks to this new technology it is possible to create a shared reality between subjects who do not trust each other.

Giuliano e Di Gravio Law Firm, provides support to companies in the implementation of projects based on blockchain, taking care, in particular, every aspect related to data security and legal regulation. He gained extensive experience following research and development projects for the creation of blockchain platforms in the field of payments and cash management, assisting companies in the negotiation of public funding and in the selection of strategic partners for the realization of projects.


Privacy and cyber security

From 25 May 2018 all the member states of the European Union refer to a single privacy legislation, dictated by the European Data Protection Regulation.


Studio Giuliano e Di Gravio has established the Team Privacy and Cyber Security (LexCy), a group of professionals and IT experts with a high profile internationally recognized, able to accompany its customers in all phases of this delicate management, through the processes of adaptation to compliance with the new regulations, the choice of technological measures to be adopted and the training to be provided to employees. This thanks to the expertise of its consultants, constantly updated on the subject matter of the consultancy.


The Team is able to prepare a preliminary assessment and to highlight the shortcomings to be filled. In fact, the choice of security measures will only take place following the analysis of the type of data being processed and the assessment of the impact of operations on them. Continuous monitoring is also required to confirm its continued adequacy. Of the choices made it will be necessary to produce documentation that explains the reasons (accountability).

Team Privacy and Cyber Security

Legal consultant: Avv. Massimo Giuliano (PhD), lawyer, coordinator and lecturer in the master “New technologies of financial services” – Inuit University of Tor Vergata.

Technical manager: Prof. Maurizio Talamo, University of Rome Tor Vergata

Business consultant: Dr Daniela Di Gravio (Data protection officer)


The activity carried out by the Team unites the competence in the elaboration of specific organizational models to compliance with the law, in compliance with Legislative Decree 231/01, with the aim of creating a new culture of privacy management within the company o the Public Administration, through dynamic and proactive management with the related adjustment system and the identification and / or definition of customized technological solutions based on the characteristics of the public or private organization, following the mapping of the data supply chain and the evaluation of risks.



In collaboration with the “Tor Vergata” Inuit University Foundation, we are able to offer training courses for the acquisition of skills from DPO (data protector officer) and for information security at the various levels of roles envisaged within the information management model.