Font Advocats | Compliance & Risk legal services of Font Advocats, law firm of Digital and Technological Law
The Compliance & Risk area of Font Advocats offers specific preventive programs so that companies enjoy the best protection: criminal compliance (review, update and implementation of crime prevention and detection models), money laundering and business secrets and cybersecurity.
Compliance & Risk, Font Advocats, criminal compliance, crime prevention and detection models, money laundering, business secrets, cybersecurity
page-template,page-template-full_width,page-template-full_width-php,page,page-id-22735,ajax_fade,page_not_loaded,,select-theme-ver-3.7,wpb-js-composer js-comp-ver-6.1,vc_responsive

Compliance & Risk

Specific preventive programs

Review, update and implementation of crime prevention and detection models (MPD):


  • Legal report and map of criminal risks
  • Ex novo writing and review of existing protocols and controls. Specifically, the necessary internal regulations for the prevention of crimes will be designed in accordance with article 31 bis 5 of Spanish Criminal Code:
    1. Ethical code
    2. Organic protocols (procedures that regulate structural and organizational issues that affect the company)
    3. Procedural protocols (protocols focused to the detection and reaction of criminal risks)
    4. Substantive protocols (Criminal protocols associated with the specific activity of the company)
  • Review and audit of systems already implemented
  • Advice, support and training to the company’s Compliance Body (compliance officer or good practices committee)
  • Training for the prevention of criminal risks at all levels (management, legal advice, internal audit, departments, etc.)
  • UNE ISO 19601 and ISO 37001 certifications
  • Implementation of manuals, protocols and complaint channels in accordance with Law
  • Implementation of organizational, technical-computer and legal measures to comply with confidentiality protection measures
Informatic security
Prevention of security incidents:


  • Analysis and technical risk report to know the level of maturity and robustness of security, detect its weaknesses and propose improvement actions (external and internal pentest)
  • Implementation of technical security measures and preparation of situation reports