Search results
711 results ordered by
A licence to kill... a licence
In the second of a number of short articles we are producing in relation to businesses in the tech space, we will be discussing a real life example of what not to do when diligencing a tech company and its third party IP licence agreements.
Read moreNew regulations to permit assignment of receivables under commercial contracts now in force
After more than four years of consultation, draft regulations and revisions, the Business Contract Terms (Assignment of Receivables) Regulations 2018 (the Regulations) have now taken effect, and apply to all relevant contracts entered into on or after 31 December 2018.
Read moreHuawei and UK National Security - A new technology cold war?
Chinese technology giant, Huawei, has been making plenty of headlines recently. First, a number of Western governments (including the US, Australia and New Zealand) have banned Huawei equipment from being used in 5G networks, citing national security concerns. Next, Huawei's CFO was arrested in Canada in connection with alleged breaches of international sanctions.
Read moreCommercial Court cracks down on crypto-fraudsters (if it can find them)
In the first initial coin offering 'ICO' fraud case before the Commercial Court, Ion Science Limited & Duncan Johns v Persons Unknown & Ors, the court granted permission to serve disclosure orders on two cryptocurrency exchanges through which the claimants' stolen bitcoin had been traced, granted a world-wide freezing order against persons unknown, and gave ground-breaking guidance on the lex situs of crypto-assets.
Read moreCyber_Bytes - Issue 46
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 45
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 44
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 43
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 42
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 41
Welcome to latest edition of Cyber_Bytes, our regular round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 40
Welcome to latest edition of Cyber_Bytes, our regular round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 39
Welcome to latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 38
We are back following a short seasonal break and hope you enjoy this latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 37
We hope you enjoy this latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 36
We are back following a break and hope you enjoy this latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 35
We hope you enjoy this latest edition of Cyber Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 34
We hope you enjoy this latest edition of Cyber_Bytes, our biweekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 33
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 32
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 31
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 30
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 29
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 28
Welcome to latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 27
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 26
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 25
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 24
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 23
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks.
Read moreCyber_Bytes - Issue 22
Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 21
Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 19
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks.
Read moreCyber bytes - Issue 17
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 16
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 15
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 14
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber Bytes - Issue 13
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber Bytes - Issue 12
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 10
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber Bytes - Issue 11
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 8 2020
Welcome to the eighth 2020 edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 9
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 7 2020
Welcome to the seventh 2020 edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 6 2020
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the first month of 2020.
Read moreCyber_Bytes - Issue 5 2019
Welcome to Cyber_Bytes, a bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read morePushing back on APP scams
An Authorised Push Payment (APP) is where a payer instructs their payment service provider, such as their bank, to send money from their account to another. These payments are usually made through the Faster Payment Service or CHAPS.
Read moreBrevan Howard's gagging order against Reuters upheld by the Court of Appeal in breach of confidence case
The news agency, Reuters, has lost its appeal against an injunction, which prevented it from reporting leaked confidential and commercially sensitive information concerning a leading global alternative asset manager, Brevan Howard Asset Management LLP.
Read more18 months on - the ICO reflects on Google Spain
The ICO has recently blogged on the cases it has received in the year and a half since the Google Spain decision last May.
Read moreBrand & Khan obtain continuing "anti-harassment" order against masseuse
The High Court has recently granted an extension to an anti-harassment injunction taken out by Russell Brand and Jemima Goldsmith, otherwise known as Jemima Khan (the Claimants), against a masseuse (the Defendant).
Read moreA Chinese lesson for private investigators
Those engaged in the investigation business – whether sniffing out personal or corporate intelligence – are well aware of the need to comply with laws that protect personal information.
Read moreCan schools take pupils' fingerprints?
The Times reported last week that parents at an independent school in north London had protested when fingerprints were allegedly taken from pupils without consent with a view to the fingerprints being used for the automated lunch payment system.
Read moreStay connected and subscribe to our latest insights and views
Subscribe Here