Search results
290 results ordered by
SMCR: The tricky implementation phase
The Senior Managers and Certification Regime (SMCR) came into force for all financial services firms solo-regulated by the Financial Conduct Authority (FCA) on 9 December 2019. The SMCR replaces the previous APER regime under which the FCA had oversight of the individuals working in the financial services industry. There is a one year implementation period for firms to make the changes required by the SMCR, which expires on 9 December 2020.
Read moreCOVID-19: The Dairy Sector and Welsh health services granted temporary UK competition law exemptions and the European Commission issues first 'Comfort Letter' to Pharmaceutical Manufacturers
The UK Government has granted a temporary competition law exemption for certain collaboration within the dairy sector and Welsh health services and the European Commission has published its first 'comfort letter' to allow co-operation to ensure supplies of medicines for COVID-19 patients.
Read moreRegulated Activities Order amendments for the new Bounce Back Loan Scheme
On 1 May 2020, the Financial Services and Markets Act 2000 (Regulated Activities) (Coronavirus) (Amendment) Order 2020 was published and came into force on 4 May 2020.
Read moreCOVID-19: What is the CMA's current approach to UK merger assessment?
The CMA has been adapting its working practices to react to the ongoing challenges of a change in working environment that has an impact on almost all businesses.
Read moreCOVID-19: Coronavirus and Competition Law - The Current Enforcement Scene
Read moreTechnology in Insurance
On 16 June 2022 RPC hosted an afternoon of talks and panel sessions on the theme of 'Technology in Insurance', the culmination of the firm's TechWeek which brings market experts and lawyers together to discuss risks and opportunities with new technologies within different business sectors.
Read moreModel Articles deemed unsuitable for sole director companies
A recent decision of the High Court in Hashmi v Lorimer-Wing [2022] EWHC 191 (Ch) has suggested that the model articles for private companies are not suitable for companies with a sole director appointed.
Read moreA licence to kill... a licence
In the second of a number of short articles we are producing in relation to businesses in the tech space, we will be discussing a real life example of what not to do when diligencing a tech company and its third party IP licence agreements.
Read moreNew regulations to permit assignment of receivables under commercial contracts now in force
After more than four years of consultation, draft regulations and revisions, the Business Contract Terms (Assignment of Receivables) Regulations 2018 (the Regulations) have now taken effect, and apply to all relevant contracts entered into on or after 31 December 2018.
Read moreHuawei and UK National Security - A new technology cold war?
Chinese technology giant, Huawei, has been making plenty of headlines recently. First, a number of Western governments (including the US, Australia and New Zealand) have banned Huawei equipment from being used in 5G networks, citing national security concerns. Next, Huawei's CFO was arrested in Canada in connection with alleged breaches of international sanctions.
Read moreCyber_Bytes - Issue 34
We hope you enjoy this latest edition of Cyber_Bytes, our biweekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 33
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 32
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 31
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 30
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 29
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 28
Welcome to latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 27
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 26
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 25
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 24
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 23
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks.
Read moreCyber_Bytes - Issue 22
Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 21
Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 19
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks.
Read moreCyber bytes - Issue 17
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 16
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 15
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 14
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber Bytes - Issue 13
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber Bytes - Issue 12
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 10
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber Bytes - Issue 11
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 8 2020
Welcome to the eighth 2020 edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 9
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 7 2020
Welcome to the seventh 2020 edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 6 2020
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the first month of 2020.
Read moreCyber_Bytes - Issue 5 2019
Welcome to Cyber_Bytes, a bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read morePushing back on APP scams
An Authorised Push Payment (APP) is where a payer instructs their payment service provider, such as their bank, to send money from their account to another. These payments are usually made through the Faster Payment Service or CHAPS.
Read moreBrevan Howard's gagging order against Reuters upheld by the Court of Appeal in breach of confidence case
The news agency, Reuters, has lost its appeal against an injunction, which prevented it from reporting leaked confidential and commercially sensitive information concerning a leading global alternative asset manager, Brevan Howard Asset Management LLP.
Read more18 months on - the ICO reflects on Google Spain
The ICO has recently blogged on the cases it has received in the year and a half since the Google Spain decision last May.
Read moreBrand & Khan obtain continuing "anti-harassment" order against masseuse
The High Court has recently granted an extension to an anti-harassment injunction taken out by Russell Brand and Jemima Goldsmith, otherwise known as Jemima Khan (the Claimants), against a masseuse (the Defendant).
Read moreA Chinese lesson for private investigators
Those engaged in the investigation business – whether sniffing out personal or corporate intelligence – are well aware of the need to comply with laws that protect personal information.
Read moreCan schools take pupils' fingerprints?
The Times reported last week that parents at an independent school in north London had protested when fingerprints were allegedly taken from pupils without consent with a view to the fingerprints being used for the automated lunch payment system.
Read moreA former editor’s view on the naked Royal
There’s an interesting view on the naked pictures of Prince Harry from a former tabloid editor.
Read moreAccess to Documents in Criminal Proceedings – Guardian Challenge Secures Change
The Court of Appeal has ruled that where documents have been placed before a judge and referred to in the course of open proceedings, the default position should be that access should be permitted on the open justice principle.
Read moreCabinet minister's 17-year-old son gets privacy injunction but not anonymity
The son of Caroline Spelman, the Environment Secretary, has obtained an injunction against the publishers of the Daily Star Sunday.
Read moreAutomatic numberplate recognition: is it legal?
A report in the Guardian last week reminds readers of the strong likelihood that local police forces have tracked their movements with the use of automatic numberplate recognition (ANPR).
Read moreA "tenuous claim to privacy": Hutcheson v News Group
Can you expect to keep a second family private? That was the ambitious hope of celebrity chef Gordon Ramsay's father-in-law, Chris Hutcheson.
Read moreA former judge reflects on privacy injunctions
Mr Justice Eady's interview last month by Joshua Rosenberg -
Read moreStay connected and subscribe to our latest insights and views
Subscribe Here