Search results
433 results ordered by
Ransoms and Sanctions and Fines (oh my!)
Ransomware attacks are happening all the time. Just the other month, the Cl0p ransomware gang claimed responsibility for the exploitation of a zero-day vulnerability in the MOVEit Transfer tool.
Read moreRansoms and Sanctions and Fines (oh my!)
Ransomware attacks are happening all the time. Just the other month, the Cl0p ransomware gang claimed responsibility for the exploitation of a zero-day vulnerability in the MOVEit Transfer tool.
Read moreDisciplinary investigations against architects #4 - investigations panel stage
Further to our previous three articles which provided (1) an overview of the Architect Registration Board's disciplinary process and (2) a review of the complaints stage (3) the review stage, this article explains the next stage of a disciplinary investigation against an Architect: the investigations panel stage.
Read moreLaw passed to regulate Significant Investments in Singapore Entities
The Significant Investments Review Bill (the "Bill") was recently passed by Parliament on 9 January 2024, and is expected to take effect in the first half of the year.
Read moreConsumer duty and claims handling – beware of sludge practices
The Consumer Duty is a new regulatory framework developed by the Financial Conduct Authority (FCA) aimed at creating a higher standard of consumer protection in the retail markets. The FCA expects the Consumer Duty to be a significant shift for the market in terms of its expectations on firms and in this blog we consider this shift in the context of insurance claims handling.
Read moreWhistle-blowing on illegal cartels drops 70% in 5 years
Competition and Markets Authority (CMA) recently increased award to £250,000 Calls to the CMA hotline have plummeted from 1,442 in 2017 to 427 in 2022
Read moreThe Model Anti-SLAPP Law: an overview
Following the Government's response to the SLAPP consultation in the summer, the UK Anti-SLAPP coalition (a working group that includes English PEN, the Foreign Policy Centre and Index on Censorship, "the Coalition") has this week published a model Anti-SLAPP law, which has been endorsed by a collection of free speech and anti-corruption organisations, journalists, editors and lawyers.
Read moreCybersecurity breaches at financial services firms more than trebles
Cybersecurity breaches reported by financial service providers rose from 187 in 2021/22 to 640 in 2022/23 UK pension schemes report the biggest increase, 4,000%, in data breach reports to the ICO
Read moreCommercial Court cracks down on crypto-fraudsters (if it can find them)
In the first initial coin offering 'ICO' fraud case before the Commercial Court, Ion Science Limited & Duncan Johns v Persons Unknown & Ors, the court granted permission to serve disclosure orders on two cryptocurrency exchanges through which the claimants' stolen bitcoin had been traced, granted a world-wide freezing order against persons unknown, and gave ground-breaking guidance on the lex situs of crypto-assets.
Read moreRPC @ London Tech Week 2024
We are delighted to announce that we will once again be hosting several in-person official fringe events around London Tech Week in June 2024.
Read moreCyber_Bytes Issue 65
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreData dispatch - July 2024
Welcome to the fifth edition of Data Dispatch from the Data Advisory team at RPC. Our aim is to provide you on a regular basis with an easy-to-digest summary of key developments in data protection law.
Read more2024 Amendments to the Cybersecurity Act 2018
The Cybersecurity Act 2018 (the "Act") first came into force more than 6 years ago to establish a legal framework for the oversight and maintenance of national cyber security in Singapore.
Read moreProviding the identity of third-party recipients of personal data to a data subject – helpful guidance from the High Court
The High Court has handed down a helpful judgment for data controllers responding to data subject access requests which analyses the circumstances in which it may be appropriate for a data controller to withhold the identities of third parties who have been provided with a data subject's personal data.
Read moreCyber_Bytes Issue 64
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes Issue 63
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreData dispatch - April 2024
Welcome to the fourth edition of Data Dispatch from the Data Advisory team at RPC. Our aim is to provide you on a regular basis with an easy-to-digest summary of key developments in data protection law.
Read moreCyber_Bytes - Issue 62
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes Issue 61
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_bytes - Issue 60
Welcome to Cyber_bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreData dispatch - January 2024
Welcome to the third edition of Data Dispatch from the Data Advisory team at RPC. Our aim is to provide you on a monthly basis with an easy-to-digest summary of key developments in data protection law.
Read moreData dispatch - December 2023
Welcome to the second edition of Data Dispatch from the Data Advisory team at RPC. Our aim is to provide you on a monthly basis with an easy-to-digest summary of key developments in data protection law.
Read moreCyber_Bytes - Issue 59
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 58
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreData dispatch - October 2023
Welcome to the first edition of Data Dispatch from the Data Advisory team at RPC. Our aim is to provide you on a monthly basis with an easy-to-digest summary of key developments in data protection law.
Read moreNew data bridge to allow for UK-US data transfers
How will the recently approved data bridge impact transfers of personal data from the UK to the US?
Read moreUK ICO publishes draft biometric data and technologies guidance for public consultation
What are the key considerations which the Information Commissioner’s Office (ICO) proposes organisations should be aware of when implementing biometric recognition systems?
Read moreUK ICO and CMA release joint position paper on harmful design in digital markets
What are the impacts of the ICO and CMA joint position paper on “Harmful Design in Digital Markets” and what action should companies take in light of its guidance?
Read moreNew Development: Updated ICO guidance on “likely to be accessed by children”
Following consultation, the ICO has updated its guidance “Likely to be accessed’ by children – FAQs, list of factors and case studies”.
Read moreUK ICO publishes joint statement on data scraping and the protection of privacy
What are the key privacy risks that the UK Information Commissioner’s Office (ICO) expects organisations to consider when hosting publicly accessible personal data and how can those privacy risks be mitigated?
Read moreCyber_Bytes - Issue 57
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 56
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreOfcom faces 30,000 cyber attacks a week, new data reveals
NCSC warn that UK infrastructure and businesses face heightened threat of cyber attacks
Read moreCyber_Bytes - Issue 55
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreICO publishes new guidance on privacy in the product design lifecycle
What are the key privacy considerations that the Information Commissioner’s Office (ICO) expects organisations to implement in the design and development of their new products and services?
Read moreThe new Data Act and the EU’s vision for non-personal data sharing in Europe
What does the proposed EU Data Act mean for the usage and sharing of non-personal data by businesses?
Read moreEuropean Data Protection Board updates guidance on data breach notifications
How does the recent update to the European Data Protection Board (EDPB) guidance impact data breach notifications for businesses?
Read moreCJEU rules on right to compensation under Article 82 EU GDPR
What must a data subject demonstrate to claim compensation for non-material damage (eg emotional distress/loss of confidence) under the EU General Data Protection Regulation (GDPR)?
Read moreIrish Data Protection Commission decision muddies the water for Meta’s EU-US data transfers
What are the implications of the Irish Data Protection Commission’s (IDPC) ruling against Meta for data transfers from the EU/EEA to the US in breach of the EU GDPR?
Read moreEU Data Protection Board guidance on international data transfers
How does the recent guidance issued by the European Data Protection Board (EDPB) assist businesses in complying with the EU GDPR when carrying out international data transfers?
Read moreOpinions aplenty on the European Commission’s draft adequacy decision regarding the EU-US Data Privacy Framework
How have the EU law-making institutions reacted to the draft adequacy decision regarding the EU-US Data Privacy Framework (DPF)?
Read moreItalian Data Protection Authority issues fine for use of dark patterns
How can companies ensure that their websites, apps and other online interfaces comply with regulations restricting the use of dark patterns when collecting consent to the processing of personal data?
Read moreICO’s new draft guidance on “likely to be accessed by children” under the Age Appropriate Design Code
When will an online service fall within the scope of the Age Appropriate Design Code?
Read moreCyber_Bytes - Issue 54
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 53
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 52
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 51
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 50
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreStay connected and subscribe to our latest insights and views
Subscribe Here