Search results
377 results ordered by
New ICO guidance on content moderation and data compliance
How can organisations using content moderation technologies and processes best comply with data protection laws?
Read moreEDPB adopts opinion on “main establishment” of a controller in the EU
What is meant by “main establishment” under article 4(16)(a) of the GDPR for the purposes of determining the application of the one-stop-shop mechanism?
Read moreNew Development: EU Data Act published in Official Journal
The EU Data Act (the Act) came into force on 11 January 2024. The Act sets out rules regarding the fair access to and use of data, aiming to enhance the data economy for individuals and businesses by overcoming barriers to data sharing and establishing frameworks around data access and use.
Read moreICO issues preliminary enforcement notice against Snap for its “My AI” Chatbot
How can organisations who wish to join to the world of generative AI ensure that they adequately assess the risks from the perspective of the Information Commissioner’s Office (ICO)?
Read moreNew Development: EDPB provides clarification on tracking techniques covered by the ePrivacy Directive
On 14 November 2023, the European Data Protection Board (EDPB) adopted a set of new guidelines (the Guidelines) on the technical scope of Article 5(3) of the ePrivacy Directive (the ePD).
Read moreICO publishes guidance to ensure lawful monitoring in the workplace
How can employers monitor their workers whilst maintaining their trust and complying with data protection regulation?
Read moreClearview AI cleared of £7.5m ICO fine for processing data outside the UK
Just how did the processing of personal data by Clearview AI (Clearview) fall outside the scope of UK GDPR?
Read moreICO publishes its draft “Data Protection Fining Guidance” for public consultation
How will the Information Commissioner’s Office (ICO) calculate the amount of a fine under the UK GPDR and the Data Protection Act (DPA) 2018?
Read moreEU Advocate General’s opinion on data subjects’ rights to compensation for non-material damage under the GDPR
Does the theft of an individual’s sensitive personal data by a wrongdoer give rise to compensation for non-material damage under Article 82 EU General Data Protection Regulation (GDPR), if the wrongdoer has not used, or taken steps to use, the sensitive personal data for any purpose?
Read moreICO updates its guidance on AI and data protection
What are the key data protection principles which the Information Commissioner’s Office (ICO) expects organisations to follow when integrating AI into their product and service offerings?
Read moreThe Times recognises RPC among Best Law Firms 2024
International law firm, RPC, has been recognised by The Times in its Best Law Firms 2024 report, an annual ranking of the top 250 law firms in England and Wales.
Read moreHow will the "Genny lec" impact the world of cyber and tech?
On 22 May 2024, Prime Minister Rishi Sunak stood in the pouring rain to announce a General Election, thus commencing a summer of political and meteorological uncertainty for those in the UK.
Read moreFines for PDPA Breaches: How Clear is the Crystal Ball?
The Singapore Personal Data Protection Commission ("PDPC") has recently issued a number of new enforcement decisions.
Read moreRansoms and Sanctions and Fines (oh my!)
Ransomware attacks are happening all the time. Just the other month, the Cl0p ransomware gang claimed responsibility for the exploitation of a zero-day vulnerability in the MOVEit Transfer tool.
Read moreRansoms and Sanctions and Fines (oh my!)
Ransomware attacks are happening all the time. Just the other month, the Cl0p ransomware gang claimed responsibility for the exploitation of a zero-day vulnerability in the MOVEit Transfer tool.
Read moreAI in auditing: Embracing a new age for the profession
Artificial Intelligence (AI) is a rather new concept for many (ignoring those versed in 80’s Sci-Fi movies); it’s something many don’t know much about and certainly don’t use in our day-to-day lives (or at least appreciate we are using). However, that’s not the case for everyone. Auditors have long been reaping the benefits of AI, but are auditors just scratching the surface of what AI can offer and what impact will an increased use have on their insurance requirements and claims they face?
Read moreLook to the future: Trainees take on 2019
The trainees didn't fare too badly with their 2018 predictions. They doubted England's ability to make it past the group stages of the World Cup, but foresaw how Brexit would dominate the news agenda. They over-optimistically predicted the introduction of automated bundling, but came very close on the value of Bitcoin. Read on to see this year's predictions.
Read moreBrexit - a legal analysis: IP rights
IP rights in the UK are all influenced and moulded to a greater or lesser degree by European law.
Read moreTelecoms supply agreement excludes "loss of profit" claim under "anticipated profits" liability exclusion (EE v Virgin Mobile)
In line with a number of recent cases, in EE Limited v Virgin Mobile Telecoms Limited [2023] EWHC 1989 (TCC) the courts have shown that parties generally cannot avoid clear wording contained in exclusion clauses in order to recover losses that have been expressly excluded (in this case, loss of profits).
Read moreRolls-Royce entitled to hit the brakes in dispute over termination of a software services agreement (Topalsson v Rolls-Royce)
In Topalsson GmbH v Rolls-Royce Motor Cars Limited [2023] EWHC 1765 (TCC), the High Court has provided useful guidance on how to determine whether a software implementation timeline agreed by the parties is binding, when implementation is considered complete and in what circumstances failing to complete implementation by the contractual deadlines entitles the customer to terminate the contract.
Read moreA narrow escape – software services provider entitled to rely on single aggregate liability cap (Drax v Wipro)
When it comes to bespoke software development projects, a lot can go wrong. There's risk for the customer such as project delays, software defects, functionality issues and a lack of meeting of minds in terms of project requirements.
Read moreAll is not (necessarily) lost: Crypto crime recovery
With over 2 million people in the UK now holding and using cryptocurrency, and the Chancellor announcing that a government backed non-fungible token ("NFT") is to be issued by the Royal Mint this summer, the market for crypto-assets is expected to continue to grow in the coming months and years; so much so that legislation is planned to implement a new regulatory regime for the crypto market.
Read moreCommercial Court cracks down on crypto-fraudsters (if it can find them)
In the first initial coin offering 'ICO' fraud case before the Commercial Court, Ion Science Limited & Duncan Johns v Persons Unknown & Ors, the court granted permission to serve disclosure orders on two cryptocurrency exchanges through which the claimants' stolen bitcoin had been traced, granted a world-wide freezing order against persons unknown, and gave ground-breaking guidance on the lex situs of crypto-assets.
Read moreCyber_Bytes - Issue 46
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 45
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 44
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 43
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 42
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 41
Welcome to latest edition of Cyber_Bytes, our regular round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 40
Welcome to latest edition of Cyber_Bytes, our regular round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 39
Welcome to latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 38
We are back following a short seasonal break and hope you enjoy this latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 37
We hope you enjoy this latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 36
We are back following a break and hope you enjoy this latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 35
We hope you enjoy this latest edition of Cyber Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 34
We hope you enjoy this latest edition of Cyber_Bytes, our biweekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 33
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 32
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 31
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 30
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 29
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 28
Welcome to latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 27
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 26
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 25
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 24
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 23
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks.
Read moreCyber_Bytes - Issue 22
Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 21
Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 19
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks.
Read moreStay connected and subscribe to our latest insights and views
Subscribe Here