Search results
272 results ordered by
Digital content under the new Consumer Rights Act
The Consumer Rights Act 2015 (CRA) comes into force on 1 October 2015. It will reform consumer law in the UK, in particular by setting up new consumer rights and remedies in respect of digital content.
Read moreUK cyber security: insure against 'rapid, highly damaging and public' threats
Cyber attacks present a daily threat to UK businesses and have become more destructive in recent years with data breaches and hacks frequently making front page news.
Read moreCourt of Appeal opens the door to 'distress-only' data breach claims where no financial loss
In an important ruling, the Court of Appeal confirms that misuse of private information is a tort and rules on the meaning of "damage" under s13 of the Data Protection Act ("the DPA"), allowing claimants to recover compensation for "distress" resulting from a breach of the Act without also having to prove pecuniary losses.
Read moreSupreme Court clarifies the limits on contractual discretion
A recent decision of the Supreme Court1 has confirmed that the limits on contractual discretion include a requirement to take relevant issues into account and that the discretion is not exercised irrationally.
Read moreCMA call for information on use of online reviews
Online reviews: love them or hate them, there is no escape. Products, services, large multinationals, SMEs, online or offline, almost everyone is being judged these days.
Read moreICO fines online travel insurer £175,000 for failing to keep customers’ personal information secure
The Information Commissioners Office (the “ICO”) has fined Staysure.co.uk Limited (“Staysure”), an online travel insurance company, £175,000 for its failure to comply with the seventh data protection principle, after IT security failings allowed hackers to access up to 100,000 customer financial records.
Read moreNew powers to audit NHS authorities' data protection compliance
From 1 February 2015, the ICO will be able to subject public healthcare organisations to compulsory audits of their data protection compliance under section 41A of the Data Protection Act 1998.
Read moreNew UK Procurement Rules Published for Consultation
Draft new Public Contracts Regulations 2015 and a Consultation Document on UK Transposition of the new EU Procurement Directives have recently been published by the Cabinet Office. This paves the way for the 2014 Directives to be implemented in the UK early next year.
Read moreFCA COMPLETES THEMATIC REVIEW OF MOBILE BANKING AND PAYMENTS
The Financial Conduct Authority (FCA) has recently published its findings following its thematic review of mobile banking and payments.
Read moreEU Consultation on Cloud Computing and Software
The EU has opened a public consultation to help define future research priorities in the areas of Cloud Computing and Software (including Open Source). Any and all stakeholders are invited to submit their views by 10 October 2014.
Read moreCyber_Bytes - Issue 34
We hope you enjoy this latest edition of Cyber_Bytes, our biweekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 33
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 32
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 31
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 30
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 29
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 28
Welcome to latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 27
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 26
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 25
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 24
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 23
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks.
Read moreCyber_Bytes - Issue 22
Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 21
Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 19
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks.
Read moreCyber bytes - Issue 17
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 16
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 15
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 14
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber Bytes - Issue 13
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber Bytes - Issue 12
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 10
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber Bytes - Issue 11
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 8 2020
Welcome to the eighth 2020 edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 9
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 7 2020
Welcome to the seventh 2020 edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 6 2020
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the first month of 2020.
Read moreCyber_Bytes - Issue 5 2019
Welcome to Cyber_Bytes, a bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read morePushing back on APP scams
An Authorised Push Payment (APP) is where a payer instructs their payment service provider, such as their bank, to send money from their account to another. These payments are usually made through the Faster Payment Service or CHAPS.
Read moreBrevan Howard's gagging order against Reuters upheld by the Court of Appeal in breach of confidence case
The news agency, Reuters, has lost its appeal against an injunction, which prevented it from reporting leaked confidential and commercially sensitive information concerning a leading global alternative asset manager, Brevan Howard Asset Management LLP.
Read more18 months on - the ICO reflects on Google Spain
The ICO has recently blogged on the cases it has received in the year and a half since the Google Spain decision last May.
Read moreBrand & Khan obtain continuing "anti-harassment" order against masseuse
The High Court has recently granted an extension to an anti-harassment injunction taken out by Russell Brand and Jemima Goldsmith, otherwise known as Jemima Khan (the Claimants), against a masseuse (the Defendant).
Read moreA Chinese lesson for private investigators
Those engaged in the investigation business – whether sniffing out personal or corporate intelligence – are well aware of the need to comply with laws that protect personal information.
Read moreCan schools take pupils' fingerprints?
The Times reported last week that parents at an independent school in north London had protested when fingerprints were allegedly taken from pupils without consent with a view to the fingerprints being used for the automated lunch payment system.
Read moreA former editor’s view on the naked Royal
There’s an interesting view on the naked pictures of Prince Harry from a former tabloid editor.
Read moreAccess to Documents in Criminal Proceedings – Guardian Challenge Secures Change
The Court of Appeal has ruled that where documents have been placed before a judge and referred to in the course of open proceedings, the default position should be that access should be permitted on the open justice principle.
Read moreCabinet minister's 17-year-old son gets privacy injunction but not anonymity
The son of Caroline Spelman, the Environment Secretary, has obtained an injunction against the publishers of the Daily Star Sunday.
Read moreAutomatic numberplate recognition: is it legal?
A report in the Guardian last week reminds readers of the strong likelihood that local police forces have tracked their movements with the use of automatic numberplate recognition (ANPR).
Read moreA "tenuous claim to privacy": Hutcheson v News Group
Can you expect to keep a second family private? That was the ambitious hope of celebrity chef Gordon Ramsay's father-in-law, Chris Hutcheson.
Read moreA former judge reflects on privacy injunctions
Mr Justice Eady's interview last month by Joshua Rosenberg -
Read moreStay connected and subscribe to our latest insights and views
Subscribe Here