Search results
322 results ordered by
How will the "Genny lec" impact the world of cyber and tech?
On 22 May 2024, Prime Minister Rishi Sunak stood in the pouring rain to announce a General Election, thus commencing a summer of political and meteorological uncertainty for those in the UK.
Read moreFines for PDPA Breaches: How Clear is the Crystal Ball?
The Singapore Personal Data Protection Commission ("PDPC") has recently issued a number of new enforcement decisions.
Read moreAI in auditing: Embracing a new age for the profession
Artificial Intelligence (AI) is a rather new concept for many (ignoring those versed in 80’s Sci-Fi movies); it’s something many don’t know much about and certainly don’t use in our day-to-day lives (or at least appreciate we are using). However, that’s not the case for everyone. Auditors have long been reaping the benefits of AI, but are auditors just scratching the surface of what AI can offer and what impact will an increased use have on their insurance requirements and claims they face?
Read moreRansoms and Sanctions and Fines (oh my!)
Ransomware attacks are happening all the time. Just the other month, the Cl0p ransomware gang claimed responsibility for the exploitation of a zero-day vulnerability in the MOVEit Transfer tool.
Read moreRansoms and Sanctions and Fines (oh my!)
Ransomware attacks are happening all the time. Just the other month, the Cl0p ransomware gang claimed responsibility for the exploitation of a zero-day vulnerability in the MOVEit Transfer tool.
Read moreOfcom's 'Roadmap to Regulation' underway with its consultation on illegal harms duties under the Online Safety Act
In November, Ofcom, as new online safety regulator, published the first of four major consultations under the Online Safety Act ("OSA"), which sets out its proposals for how "user-to-user" ("U2U") services (essentially any online website or app that allows users to interact with each other) and online search services (i.e. Google, Bing and similar) should approach their illegal content duties under the new legislation. The consultation provides guidance in a number of areas including governance, content moderation, reporting and complaints mechanisms, terms of service, supporting child users, and user empowerment.
Read moreThe Online Safety Bill is set to become law
The Online Safety Bill will shortly become law in the UK as soon as it receives Royal Assent. The legislation will introduce a new regulatory regime for online platforms and search engines which target the UK, imposing wide-ranging obligations on in-scope services with serious consequences for non-compliance.
Read moreTelecoms supply agreement excludes "loss of profit" claim under "anticipated profits" liability exclusion (EE v Virgin Mobile)
In line with a number of recent cases, in EE Limited v Virgin Mobile Telecoms Limited [2023] EWHC 1989 (TCC) the courts have shown that parties generally cannot avoid clear wording contained in exclusion clauses in order to recover losses that have been expressly excluded (in this case, loss of profits).
Read moreRolls-Royce entitled to hit the brakes in dispute over termination of a software services agreement (Topalsson v Rolls-Royce)
In Topalsson GmbH v Rolls-Royce Motor Cars Limited [2023] EWHC 1765 (TCC), the High Court has provided useful guidance on how to determine whether a software implementation timeline agreed by the parties is binding, when implementation is considered complete and in what circumstances failing to complete implementation by the contractual deadlines entitles the customer to terminate the contract.
Read moreA narrow escape – software services provider entitled to rely on single aggregate liability cap (Drax v Wipro)
When it comes to bespoke software development projects, a lot can go wrong. There's risk for the customer such as project delays, software defects, functionality issues and a lack of meeting of minds in terms of project requirements.
Read more“Gagging orders”: an office holder’s secret weapon
Practitioners are fully aware of the extensive powers available under ss 235 and 236 of the Insolvency Act 1986 (IA 1986) allowing administrators and liquidators as office holders (OHs) to require individuals and organisations to disgorge information.
Read moreMake insolvency great again
One of the great criticisms of the new President of the United States of America is that his companies filed for bankruptcy four times when he was a business mogul.
Read moreLaw passed to regulate Significant Investments in Singapore Entities
The Significant Investments Review Bill (the "Bill") was recently passed by Parliament on 9 January 2024, and is expected to take effect in the first half of the year.
Read moreCommercial Court cracks down on crypto-fraudsters (if it can find them)
In the first initial coin offering 'ICO' fraud case before the Commercial Court, Ion Science Limited & Duncan Johns v Persons Unknown & Ors, the court granted permission to serve disclosure orders on two cryptocurrency exchanges through which the claimants' stolen bitcoin had been traced, granted a world-wide freezing order against persons unknown, and gave ground-breaking guidance on the lex situs of crypto-assets.
Read moreCyber_Bytes - Issue 46
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 45
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 44
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 43
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 42
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 41
Welcome to latest edition of Cyber_Bytes, our regular round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 40
Welcome to latest edition of Cyber_Bytes, our regular round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 39
Welcome to latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 38
We are back following a short seasonal break and hope you enjoy this latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 37
We hope you enjoy this latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 36
We are back following a break and hope you enjoy this latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 35
We hope you enjoy this latest edition of Cyber Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 34
We hope you enjoy this latest edition of Cyber_Bytes, our biweekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 33
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 32
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 31
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 30
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 29
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 28
Welcome to latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 27
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 26
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 25
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 24
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 23
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks.
Read moreCyber_Bytes - Issue 22
Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 21
Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 19
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks.
Read moreCyber bytes - Issue 17
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 16
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 15
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 14
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber Bytes - Issue 13
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber Bytes - Issue 12
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreStay connected and subscribe to our latest insights and views
Subscribe Here