Search results
294 results ordered by
Ransoms and Sanctions and Fines (oh my!)
Ransomware attacks are happening all the time. Just the other month, the Cl0p ransomware gang claimed responsibility for the exploitation of a zero-day vulnerability in the MOVEit Transfer tool.
Read moreRansoms and Sanctions and Fines (oh my!)
Ransomware attacks are happening all the time. Just the other month, the Cl0p ransomware gang claimed responsibility for the exploitation of a zero-day vulnerability in the MOVEit Transfer tool.
Read moreHong Kong data protection: cross-border transfers of personal data
We take a closer look at businesses' obligations under Hong Kong law to protect personal data in a cross-border transfer and the new recommended model contractual clauses.
Read moreAll is not (necessarily) lost: Crypto crime recovery
With over 2 million people in the UK now holding and using cryptocurrency, and the Chancellor announcing that a government backed non-fungible token ("NFT") is to be issued by the Royal Mint this summer, the market for crypto-assets is expected to continue to grow in the coming months and years; so much so that legislation is planned to implement a new regulatory regime for the crypto market.
Read more“Gagging orders”: an office holder’s secret weapon
Practitioners are fully aware of the extensive powers available under ss 235 and 236 of the Insolvency Act 1986 (IA 1986) allowing administrators and liquidators as office holders (OHs) to require individuals and organisations to disgorge information.
Read moreMake insolvency great again
One of the great criticisms of the new President of the United States of America is that his companies filed for bankruptcy four times when he was a business mogul.
Read moreLaw passed to regulate Significant Investments in Singapore Entities
The Significant Investments Review Bill (the "Bill") was recently passed by Parliament on 9 January 2024, and is expected to take effect in the first half of the year.
Read moreConsumer duty and claims handling – beware of sludge practices
The Consumer Duty is a new regulatory framework developed by the Financial Conduct Authority (FCA) aimed at creating a higher standard of consumer protection in the retail markets. The FCA expects the Consumer Duty to be a significant shift for the market in terms of its expectations on firms and in this blog we consider this shift in the context of insurance claims handling.
Read moreCybersecurity breaches at financial services firms more than trebles
Cybersecurity breaches reported by financial service providers rose from 187 in 2021/22 to 640 in 2022/23 UK pension schemes report the biggest increase, 4,000%, in data breach reports to the ICO
Read moreCommercial Court cracks down on crypto-fraudsters (if it can find them)
In the first initial coin offering 'ICO' fraud case before the Commercial Court, Ion Science Limited & Duncan Johns v Persons Unknown & Ors, the court granted permission to serve disclosure orders on two cryptocurrency exchanges through which the claimants' stolen bitcoin had been traced, granted a world-wide freezing order against persons unknown, and gave ground-breaking guidance on the lex situs of crypto-assets.
Read moreCyber_Bytes Issue 65
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreData dispatch - July 2024
Welcome to the fifth edition of Data Dispatch from the Data Advisory team at RPC. Our aim is to provide you on a regular basis with an easy-to-digest summary of key developments in data protection law.
Read more2024 Amendments to the Cybersecurity Act 2018
The Cybersecurity Act 2018 (the "Act") first came into force more than 6 years ago to establish a legal framework for the oversight and maintenance of national cyber security in Singapore.
Read moreProviding the identity of third-party recipients of personal data to a data subject – helpful guidance from the High Court
The High Court has handed down a helpful judgment for data controllers responding to data subject access requests which analyses the circumstances in which it may be appropriate for a data controller to withhold the identities of third parties who have been provided with a data subject's personal data.
Read moreCyber_Bytes Issue 64
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes Issue 63
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreData dispatch - April 2024
Welcome to the fourth edition of Data Dispatch from the Data Advisory team at RPC. Our aim is to provide you on a regular basis with an easy-to-digest summary of key developments in data protection law.
Read moreCyber_Bytes - Issue 62
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes Issue 61
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_bytes - Issue 60
Welcome to Cyber_bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreData dispatch - January 2024
Welcome to the third edition of Data Dispatch from the Data Advisory team at RPC. Our aim is to provide you on a monthly basis with an easy-to-digest summary of key developments in data protection law.
Read moreData dispatch - December 2023
Welcome to the second edition of Data Dispatch from the Data Advisory team at RPC. Our aim is to provide you on a monthly basis with an easy-to-digest summary of key developments in data protection law.
Read moreCyber_Bytes - Issue 59
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 58
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreData dispatch - October 2023
Welcome to the first edition of Data Dispatch from the Data Advisory team at RPC. Our aim is to provide you on a monthly basis with an easy-to-digest summary of key developments in data protection law.
Read moreNew data bridge to allow for UK-US data transfers
How will the recently approved data bridge impact transfers of personal data from the UK to the US?
Read moreUK ICO publishes draft biometric data and technologies guidance for public consultation
What are the key considerations which the Information Commissioner’s Office (ICO) proposes organisations should be aware of when implementing biometric recognition systems?
Read moreUK ICO and CMA release joint position paper on harmful design in digital markets
What are the impacts of the ICO and CMA joint position paper on “Harmful Design in Digital Markets” and what action should companies take in light of its guidance?
Read moreNew Development: Updated ICO guidance on “likely to be accessed by children”
Following consultation, the ICO has updated its guidance “Likely to be accessed’ by children – FAQs, list of factors and case studies”.
Read moreUK ICO publishes joint statement on data scraping and the protection of privacy
What are the key privacy risks that the UK Information Commissioner’s Office (ICO) expects organisations to consider when hosting publicly accessible personal data and how can those privacy risks be mitigated?
Read moreCyber_Bytes - Issue 57
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 56
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreOfcom faces 30,000 cyber attacks a week, new data reveals
NCSC warn that UK infrastructure and businesses face heightened threat of cyber attacks
Read moreCyber_Bytes - Issue 55
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreICO publishes new guidance on privacy in the product design lifecycle
What are the key privacy considerations that the Information Commissioner’s Office (ICO) expects organisations to implement in the design and development of their new products and services?
Read moreThe new Data Act and the EU’s vision for non-personal data sharing in Europe
What does the proposed EU Data Act mean for the usage and sharing of non-personal data by businesses?
Read moreEuropean Data Protection Board updates guidance on data breach notifications
How does the recent update to the European Data Protection Board (EDPB) guidance impact data breach notifications for businesses?
Read moreCJEU rules on right to compensation under Article 82 EU GDPR
What must a data subject demonstrate to claim compensation for non-material damage (eg emotional distress/loss of confidence) under the EU General Data Protection Regulation (GDPR)?
Read moreIrish Data Protection Commission decision muddies the water for Meta’s EU-US data transfers
What are the implications of the Irish Data Protection Commission’s (IDPC) ruling against Meta for data transfers from the EU/EEA to the US in breach of the EU GDPR?
Read moreEU Data Protection Board guidance on international data transfers
How does the recent guidance issued by the European Data Protection Board (EDPB) assist businesses in complying with the EU GDPR when carrying out international data transfers?
Read moreOpinions aplenty on the European Commission’s draft adequacy decision regarding the EU-US Data Privacy Framework
How have the EU law-making institutions reacted to the draft adequacy decision regarding the EU-US Data Privacy Framework (DPF)?
Read moreItalian Data Protection Authority issues fine for use of dark patterns
How can companies ensure that their websites, apps and other online interfaces comply with regulations restricting the use of dark patterns when collecting consent to the processing of personal data?
Read moreICO’s new draft guidance on “likely to be accessed by children” under the Age Appropriate Design Code
When will an online service fall within the scope of the Age Appropriate Design Code?
Read moreCyber_Bytes - Issue 54
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 53
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 52
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 51
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreStay connected and subscribe to our latest insights and views
Subscribe Here