Search results
317 results ordered by
Cyber_Bytes - Issue 24
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 23
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks.
Read moreCyber_Bytes - Issue 22
Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 21
Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 19
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks.
Read moreCyber bytes - Issue 17
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 16
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 15
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 14
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber Bytes - Issue 13
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber Bytes - Issue 12
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 10
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber Bytes - Issue 11
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 8 2020
Welcome to the eighth 2020 edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 9
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 7 2020
Welcome to the seventh 2020 edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 6 2020
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the first month of 2020.
Read moreCyber_Bytes - Issue 5 2019
Welcome to Cyber_Bytes, a bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read morePushing back on APP scams
An Authorised Push Payment (APP) is where a payer instructs their payment service provider, such as their bank, to send money from their account to another. These payments are usually made through the Faster Payment Service or CHAPS.
Read moreBrevan Howard's gagging order against Reuters upheld by the Court of Appeal in breach of confidence case
The news agency, Reuters, has lost its appeal against an injunction, which prevented it from reporting leaked confidential and commercially sensitive information concerning a leading global alternative asset manager, Brevan Howard Asset Management LLP.
Read more18 months on - the ICO reflects on Google Spain
The ICO has recently blogged on the cases it has received in the year and a half since the Google Spain decision last May.
Read moreBrand & Khan obtain continuing "anti-harassment" order against masseuse
The High Court has recently granted an extension to an anti-harassment injunction taken out by Russell Brand and Jemima Goldsmith, otherwise known as Jemima Khan (the Claimants), against a masseuse (the Defendant).
Read moreA Chinese lesson for private investigators
Those engaged in the investigation business – whether sniffing out personal or corporate intelligence – are well aware of the need to comply with laws that protect personal information.
Read moreCan schools take pupils' fingerprints?
The Times reported last week that parents at an independent school in north London had protested when fingerprints were allegedly taken from pupils without consent with a view to the fingerprints being used for the automated lunch payment system.
Read moreA former editor’s view on the naked Royal
There’s an interesting view on the naked pictures of Prince Harry from a former tabloid editor.
Read moreAccess to Documents in Criminal Proceedings – Guardian Challenge Secures Change
The Court of Appeal has ruled that where documents have been placed before a judge and referred to in the course of open proceedings, the default position should be that access should be permitted on the open justice principle.
Read moreCabinet minister's 17-year-old son gets privacy injunction but not anonymity
The son of Caroline Spelman, the Environment Secretary, has obtained an injunction against the publishers of the Daily Star Sunday.
Read moreA "tenuous claim to privacy": Hutcheson v News Group
Can you expect to keep a second family private? That was the ambitious hope of celebrity chef Gordon Ramsay's father-in-law, Chris Hutcheson.
Read moreA former judge reflects on privacy injunctions
Mr Justice Eady's interview last month by Joshua Rosenberg -
Read moreA digest of recent news (1) - UK judgments
For one reason and another, the blog has been unable to report on much of the recent news. This entry is an attempt to remedy the situation. Normal service should be resumed shortly.
Read moreAnother ruling on privacy injunctions
Judgment was handed down today in a case where a privacy injunction was made in 2008.
Read moreCan employers spy on their employees?
The US media have reported a number of instances in which companies have hired private detectives to spy on workers taking "sickies".
Read moreAnonymity order lifted in marital privacy case
A High Court judge has lifted an anonymity order protecting the identity of a formerly married couple involved in a privacy dispute.
Read moreAnonymity proposed for teachers accused by pupils
The controversial Education Bill was published on 26 January 2011.
Read moreA mass outbreak of anonymity: CDE and FGH v MGN and LMN
It is not unusual for claimants in privacy cases to be anonymised. It is less common for defendants and distinctly unusual for non-parties.
Read more7/7 footage withheld from public to protect privacy of victims and their families
The Coroner conducting the inquest into the terror attacks in London on 7 July 2005 has ordered that certain footage shown in court of the aftermath of the 7/7 attacks should not be released to the media.
Read moreAnonymity of egg and sperm donors
A survey by Manchester Fertility Services highlights issues of privacy concerning egg and sperm donation.
Read moreApplications for privacy injunctions – when notice need not be given
In DFT v TFD [2010] EWHC 2335 (QB) Sharp J made an order to restrain publication of allegedly private and confidential information without notice having been given to either the respondent or the media.
Read moreAnonymisation of parties in matrimonial proceedings
The Court of Appeal has lifted an order by a family court judge which directed that the parties to the proceedings should be anonymised.
Read moreTelecoms supply agreement excludes "loss of profit" claim under "anticipated profits" liability exclusion (EE v Virgin Mobile)
In line with a number of recent cases, in EE Limited v Virgin Mobile Telecoms Limited [2023] EWHC 1989 (TCC) the courts have shown that parties generally cannot avoid clear wording contained in exclusion clauses in order to recover losses that have been expressly excluded (in this case, loss of profits).
Read moreRolls-Royce entitled to hit the brakes in dispute over termination of a software services agreement (Topalsson v Rolls-Royce)
In Topalsson GmbH v Rolls-Royce Motor Cars Limited [2023] EWHC 1765 (TCC), the High Court has provided useful guidance on how to determine whether a software implementation timeline agreed by the parties is binding, when implementation is considered complete and in what circumstances failing to complete implementation by the contractual deadlines entitles the customer to terminate the contract.
Read moreA narrow escape – software services provider entitled to rely on single aggregate liability cap (Drax v Wipro)
When it comes to bespoke software development projects, a lot can go wrong. There's risk for the customer such as project delays, software defects, functionality issues and a lack of meeting of minds in terms of project requirements.
Read moreMajor overhaul of UK telecoms regulation to go ahead by the end of December 2020
The UK still pushing ahead with implementing wide ranging European regulatory changes, but obligations for many "over the top" providers are likely to be postponed.
Read moreCybersecurity breaches at financial services firms more than trebles
Cybersecurity breaches reported by financial service providers rose from 187 in 2021/22 to 640 in 2022/23 UK pension schemes report the biggest increase, 4,000%, in data breach reports to the ICO
Read moreFinal UK listing rules: modified transfer process for issuers in transition category
On 11 July 2024, the FCA published the final UK Listing Rules (UKLR) which came into effect on 29 July 2024 (Implementation Date). The UKLR are broadly in line with the FCA's previous proposals.
Read moreUK government updates NSIA market guidance and statement on call-in powers
Recent developments such as the removal of Huawei from the UK's 5G networks and President Biden's 2023 executive order on outbound investment in sensitive technologies have brought into focus potential national security risks arising from global trade and investment.
Read moreProposed removal of requirement for shareholder vote on significant transactions and related party transactions: FCA provides update on Listing Rule reforms
The FCA has provided an update on reforms to the Listing Rules proposed last year in its discussion paper DP22/2.
Read moreKey takeaways from the first year of the national security regime
The UK's new national security screening regime has now been in operation for over a year. This blog discusses the key takeaways from the first decisions to be made under the UK's new national security screening regime.
Read moreStay connected and subscribe to our latest insights and views
Subscribe Here