Search results
182 results ordered by
FCA Publish Draft Guidance on Cloud Services
The FCA has recently published draft guidance for firms outsourcing to the cloud and other third party IT services. This comes as part of the FCA's work on "Project Innovate" which aims to tackle issues stifling innovation within the regulatory sector.
Read moreFCA to examine use of big data in insurance
This week, the FCA has issued a "call for inputs" around how insurance firms use big data.
Read moreThe Modern Slavery Act: what you need to know about the new reporting obligation
The Modern Slavery Act 2015 (the Act) came into force on 26 March 2015. At a high level it aims to improve law enforcement tools, strengthen criminal penalties and deliver better protection and support for victims.
Read moreEU Court declares 'Safe Harbor' data-transfer agreement invalid
The Court of Justice of the European (CJEU) has declared that the "Safe Harbor" framework agreement cannot be relied upon to justify transfers of personal data from the EU to the US.
Read moreDo you know you're being tracked?
Do you own a smart phone? Do you always have WiFi enabled? If your answers to both these questions are yes, your movements were most probably tracked on your way into work today.
Read moreEU Consultation on standards for a Digital Single Market
On 23 September 2015, the European Commission launched a public consultation on information and communications technology ("ICT") standards for creation of a Digital Single Market.
Read moreUpdate: IT Suppliers beware! Your right to terminate on a customer insolvency is changing…
In September 2013 we reported on the Enterprise and Regulatory Reform Act 2013 which provided the Government with the power to extend the law regarding the supply of essential services to insolvent customers.
Read moreArticle 29 Working Party keeps up the pressure on data reform discussions
The EU data protection reform package has entered its decisive phase. The first trilogue between the European Parliament, the European Commission and the Council of Ministers began on 24 June 2015 but, even at this late stage, there are many key concepts still to be finalised.
Read moreTransparency by design – putting FOIA at the forefront of public sector outsourcing contracts
Earlier this year, the Information Commissioner's Office (ICO) published a guidance document recommending some steps for public authorities (Authorities) to take when entering into outsourcing arrangements to help them comply with their freedom of information obligations.
Read moreDigital content under the new Consumer Rights Act
The Consumer Rights Act 2015 (CRA) comes into force on 1 October 2015. It will reform consumer law in the UK, in particular by setting up new consumer rights and remedies in respect of digital content.
Read moreUK cyber security: insure against 'rapid, highly damaging and public' threats
Cyber attacks present a daily threat to UK businesses and have become more destructive in recent years with data breaches and hacks frequently making front page news.
Read moreCourt of Appeal opens the door to 'distress-only' data breach claims where no financial loss
In an important ruling, the Court of Appeal confirms that misuse of private information is a tort and rules on the meaning of "damage" under s13 of the Data Protection Act ("the DPA"), allowing claimants to recover compensation for "distress" resulting from a breach of the Act without also having to prove pecuniary losses.
Read moreSupreme Court clarifies the limits on contractual discretion
A recent decision of the Supreme Court1 has confirmed that the limits on contractual discretion include a requirement to take relevant issues into account and that the discretion is not exercised irrationally.
Read moreCMA call for information on use of online reviews
Online reviews: love them or hate them, there is no escape. Products, services, large multinationals, SMEs, online or offline, almost everyone is being judged these days.
Read moreICO fines online travel insurer £175,000 for failing to keep customers’ personal information secure
The Information Commissioners Office (the “ICO”) has fined Staysure.co.uk Limited (“Staysure”), an online travel insurance company, £175,000 for its failure to comply with the seventh data protection principle, after IT security failings allowed hackers to access up to 100,000 customer financial records.
Read moreNew powers to audit NHS authorities' data protection compliance
From 1 February 2015, the ICO will be able to subject public healthcare organisations to compulsory audits of their data protection compliance under section 41A of the Data Protection Act 1998.
Read moreNew UK Procurement Rules Published for Consultation
Draft new Public Contracts Regulations 2015 and a Consultation Document on UK Transposition of the new EU Procurement Directives have recently been published by the Cabinet Office. This paves the way for the 2014 Directives to be implemented in the UK early next year.
Read moreFCA COMPLETES THEMATIC REVIEW OF MOBILE BANKING AND PAYMENTS
The Financial Conduct Authority (FCA) has recently published its findings following its thematic review of mobile banking and payments.
Read moreEU Consultation on Cloud Computing and Software
The EU has opened a public consultation to help define future research priorities in the areas of Cloud Computing and Software (including Open Source). Any and all stakeholders are invited to submit their views by 10 October 2014.
Read more2024 Amendments to the Cybersecurity Act 2018
The Cybersecurity Act 2018 (the "Act") first came into force more than 6 years ago to establish a legal framework for the oversight and maintenance of national cyber security in Singapore.
Read moreThe NIS Regulations to expand to bring outsourced IT providers and managed service providers into scope
The UK's Network and Information Systems ("NIS") Regulations came into force in May 2018 to boost the level of security of network and information systems for the provision of essential services, such as transport, energy, water, health and digital infrastructure ("operators of essential services (OES)"). These Regulations also applied to digital services, such as online marketplaces, online search engines and cloud computing services ("relevant digital service providers (RDSPs)").
Read moreRPC Law x Web3: If There's Something Strange in the Web3 World, Who You Gonna Call?
"And the way we win is by creating a new, democratic, decentralised internet, one where the behaviour of companies like this will be impossible forever. One where it is the users, not the kings, who have sovereign control over their data." - Richard Hendricks, in the HBO TV Series "Silicon Valley", portrayed by Thomas Middleditch
Read moreRPC Law x Web3: Considerations for NFT Founders Building Communities and Providing Utility to Holders
In the past when one purchased an NFT, the only expectation was that he, she, or they was purchasing rights in an asset (usually a digital artwork).
Read moreRPC Law x Web3: Ownership of Digital Assets in Web3
This is the inaugural part of a series of articles relating to legal issues around Web3. Over the course of the next few months, will hope to provide you with some thoughts and insights on the areas of Web3 where potential legal issues may arise based on current laws.
Read moreEDPB guidelines on personal data breach notifications
Last month, the EDPB published their "Guidelines on Examples regarding Personal Data Breach Notification" (the Guidelines). These are intended to provide "practice-oriented, case-based" guidance on when it is necessary to notify the relevant supervisory authorities (the SA) under Article 33(1) of the GDPR and/or data subjects under Article 34(1) of the GDPR following a personal data breach.
Read moreThe Supreme Court hands down judgment in Lloyd v Google
In a keenly anticipated judgment that has significant ramifications for UK data protection, the Supreme Court has today overturned the Court of Appeal's decision in Lloyd v Google and restored the original order made by the High Court, refusing the claimant's application for permission to serve proceedings on Google outside the jurisdiction.
Read moreCyber_Bytes - Issue 34
We hope you enjoy this latest edition of Cyber_Bytes, our biweekly roundup of key developments in cyber, tech and evolving risks.
Read moreCase comment: striking out of privacy and confidence actions in the Dixons data breach case
The number of claims issued in the High Court (Media and Communications List) with a data protection element continues to increase. The rise in claim numbers can be attributed to a number of factors including: (i) individuals becoming more aware of their rights under data protection legislation, (ii) uncertainty as to whether individuals may recover damages for a loss of control of their personal data without proving material damage or distress; (iii) the abundance of specialist law firms who are prepared to act for individuals on a "no-win-no-fee" basis and (iv) the availability of After the Event ("ATE") insurance to protect a would-be claimant against adverse costs orders.
Read moreCyber_Bytes - Issue 33
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 32
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 31
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 30
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 29
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 28
Welcome to latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 27
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 26
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 25
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 24
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 23
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks.
Read moreCyber_Bytes - Issue 22
Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 21
Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 19
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks.
Read moreSchrems II – Groundhog Day for Data Transfers
On Thursday 16 July, the Court of Justice of the European Union (“CJEU”) delivered its judgment in one of the most highly anticipated court cases in data protection, Case C-311/18 Data Protection Commissioner v Facebook Ireland Limited, Maximillian Schrems (widely referred to as “Schrems II”). This decision came almost 8 months after Advocate General Saugmandsgaard Øe published his Opinion, which albeit not binding, provided a strong indication for the CJEU's judgment.
Read moreRestarting your business and implementing Government guidance to support NHS Test and Trace
In its latest guidance on keeping workers and customers safe during COVID-19 in restaurants, pubs, bars and takeaway services (23 June 2020), the Government has recommended that businesses operating in these sectors keep a temporary record of customers and visitors for 21 days. This will assist NHS Test and Trace with requests for that data if needed.
Read moreCyber bytes - Issue 17
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 16
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 15
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 14
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber Bytes - Issue 13
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber Bytes - Issue 12
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreStay connected and subscribe to our latest insights and views
Subscribe Here