Search results
127 results ordered by
The November 2023 AI safety summit and the UK's direction of travel
The government has confirmed that the UK AI safety summit will be held at Bletchley Park on 1 and 2 November 2023.
Read moreNew developments in AI may put law firms at greater risk of phishing fraud
As the computing power of Artificial Intelligence continues to grow exponentially, we consider how generative technology may expand the reach of traditional phishing frauds aimed at law firms.
Read moreThe Corporate Sustainability Due Diligence Directive expert briefing
The Corporate Sustainability Due Diligence Directive (CSDDD) was adopted on 24 May 2024 and was published in the Official Journal of the EU on 5 July. This means the law will enter into force 20 days later on 26 July, and will apply to companies from 2027.
Read moreAI in auditing: Embracing a new age for the profession
Artificial Intelligence (AI) is a rather new concept for many (ignoring those versed in 80’s Sci-Fi movies); it’s something many don’t know much about and certainly don’t use in our day-to-day lives (or at least appreciate we are using). However, that’s not the case for everyone. Auditors have long been reaping the benefits of AI, but are auditors just scratching the surface of what AI can offer and what impact will an increased use have on their insurance requirements and claims they face?
Read moreHow will the "Genny lec" impact the world of cyber and tech?
On 22 May 2024, Prime Minister Rishi Sunak stood in the pouring rain to announce a General Election, thus commencing a summer of political and meteorological uncertainty for those in the UK.
Read moreFines for PDPA Breaches: How Clear is the Crystal Ball?
The Singapore Personal Data Protection Commission ("PDPC") has recently issued a number of new enforcement decisions.
Read moreTelecoms supply agreement excludes "loss of profit" claim under "anticipated profits" liability exclusion (EE v Virgin Mobile)
In line with a number of recent cases, in EE Limited v Virgin Mobile Telecoms Limited [2023] EWHC 1989 (TCC) the courts have shown that parties generally cannot avoid clear wording contained in exclusion clauses in order to recover losses that have been expressly excluded (in this case, loss of profits).
Read moreRolls-Royce entitled to hit the brakes in dispute over termination of a software services agreement (Topalsson v Rolls-Royce)
In Topalsson GmbH v Rolls-Royce Motor Cars Limited [2023] EWHC 1765 (TCC), the High Court has provided useful guidance on how to determine whether a software implementation timeline agreed by the parties is binding, when implementation is considered complete and in what circumstances failing to complete implementation by the contractual deadlines entitles the customer to terminate the contract.
Read moreA narrow escape – software services provider entitled to rely on single aggregate liability cap (Drax v Wipro)
When it comes to bespoke software development projects, a lot can go wrong. There's risk for the customer such as project delays, software defects, functionality issues and a lack of meeting of minds in terms of project requirements.
Read moreThe CAT's new approach: I can't afford a carriage (dispute)
Since the collective proceedings regime in the UK's Competition Appeal Tribunal (CAT) kicked off, a number of carriage disputes have arisen. So-called 'carriage disputes' arise when there are two or more competing proposed class representatives (PCRs) seeking certification (and therefore 'carriage') of overlapping class actions.
Read more2023 Update - CAT Collective Proceedings
A new era of consumer-focussed competition class actions is now well underway. It kicked off with the first collective proceedings order (CPO) granted by the Competition Appeal Tribunal (CAT) in Merricks in the summer of 2021, opening the gates for further collective claims to be certified.
Read moreThe High Court continues interim anti-harassment injunction
At a return date hearing on 12 July 2024, Aidan Eardley KC (sitting as a Deputy High Court Judge) continued until trial or further order an anti-harassment injunction granted to prevent the Defendant from, amongst other things, approaching or contacting the Claimant.
Read moreThe Supreme Court clarifies the law on the recovery of damages for non-pecuniary damage arising out of a maliciously false statement
The Claimant was an employee of the second defendant, LCA, a recruitment agency owned and operated by the first defendant. After leaving LCA, the Claimant was employed by another recruitment agency and began targeting LCA's clients. LCA's owner told two third parties, one of whom was the Claimant’s new line manager and the other a client of LCA, that by doing this the Claimant was in breach of her contract of employment with LCA. In fact, there was no term of that contract (as the owner of LCA knew) which prohibited the claimant from soliciting business from LCA’s clients.
Read moreThe Model Anti-SLAPP Law: an overview
Following the Government's response to the SLAPP consultation in the summer, the UK Anti-SLAPP coalition (a working group that includes English PEN, the Foreign Policy Centre and Index on Censorship, "the Coalition") has this week published a model Anti-SLAPP law, which has been endorsed by a collection of free speech and anti-corruption organisations, journalists, editors and lawyers.
Read moreEU AI ACT-ion stations
The EU is forging ahead with its vision for AI. With wrapping up talks on the EU AI Act between the EU governments, the Commission and the parliamentary negotiators imminent, we bring you up to date on the EU's risk based approach, the scope of the Act, a timeline, key points that will form the basis of the discussions and next steps.
Read moreWhat To Know About AI Fraudsters Before Facing Disputes
Fraudsters are quick to weaponise new technological developments and artificial intelligence is proving no exception, with AI-assisted scams increasingly being reported in the news, including most recently one using a likeness of a BBC broadcaster.
Read moreICO Processor fine – the ICO's approach to assessing technical standards and its impact
The ICO recently confirmed its provisional decision to fine Advanced Computer Software Group £6.09 million following a data breach that it suffered in 2022.
Read more2024 Amendments to the Cybersecurity Act 2018
The Cybersecurity Act 2018 (the "Act") first came into force more than 6 years ago to establish a legal framework for the oversight and maintenance of national cyber security in Singapore.
Read moreProviding the identity of third-party recipients of personal data to a data subject – helpful guidance from the High Court
The High Court has handed down a helpful judgment for data controllers responding to data subject access requests which analyses the circumstances in which it may be appropriate for a data controller to withhold the identities of third parties who have been provided with a data subject's personal data.
Read moreChanges to the One Stop Shop
In July 2023 the European Commission issued a Proposal for a Regulation of the European Parliament and of the Council laying down additional procedural rules relating to the enforcement of Regulation (EU) 2016/679 (the 'GDPR' Regulations).
Read moreCloud computing in business: A silver lining?
Cloud computing is a resource that businesses have rapidly adopted as a major step towards completing their digitalisation.
Read moreRPC Law x Web3: Gambling regulations – Don't Play Games of Chance with the Law
This is part of a series of RPC x Web3 articles designed to help Web3 participants and enthusiasts understand their rights in this rapidly evolving space.
Read moreThe NIS Regulations to expand to bring outsourced IT providers and managed service providers into scope
The UK's Network and Information Systems ("NIS") Regulations came into force in May 2018 to boost the level of security of network and information systems for the provision of essential services, such as transport, energy, water, health and digital infrastructure ("operators of essential services (OES)"). These Regulations also applied to digital services, such as online marketplaces, online search engines and cloud computing services ("relevant digital service providers (RDSPs)").
Read moreRPC Law x Web3: If There's Something Strange in the Web3 World, Who You Gonna Call?
"And the way we win is by creating a new, democratic, decentralised internet, one where the behaviour of companies like this will be impossible forever. One where it is the users, not the kings, who have sovereign control over their data." - Richard Hendricks, in the HBO TV Series "Silicon Valley", portrayed by Thomas Middleditch
Read moreRPC Law x Web3: Considerations for NFT Founders Building Communities and Providing Utility to Holders
In the past when one purchased an NFT, the only expectation was that he, she, or they was purchasing rights in an asset (usually a digital artwork).
Read moreRPC Law x Web3: Ownership of Digital Assets in Web3
This is the inaugural part of a series of articles relating to legal issues around Web3. Over the course of the next few months, will hope to provide you with some thoughts and insights on the areas of Web3 where potential legal issues may arise based on current laws.
Read moreEDPB guidelines on personal data breach notifications
Last month, the EDPB published their "Guidelines on Examples regarding Personal Data Breach Notification" (the Guidelines). These are intended to provide "practice-oriented, case-based" guidance on when it is necessary to notify the relevant supervisory authorities (the SA) under Article 33(1) of the GDPR and/or data subjects under Article 34(1) of the GDPR following a personal data breach.
Read moreThe Supreme Court hands down judgment in Lloyd v Google
In a keenly anticipated judgment that has significant ramifications for UK data protection, the Supreme Court has today overturned the Court of Appeal's decision in Lloyd v Google and restored the original order made by the High Court, refusing the claimant's application for permission to serve proceedings on Google outside the jurisdiction.
Read moreCyber_Bytes - Issue 34
We hope you enjoy this latest edition of Cyber_Bytes, our biweekly roundup of key developments in cyber, tech and evolving risks.
Read moreCase comment: striking out of privacy and confidence actions in the Dixons data breach case
The number of claims issued in the High Court (Media and Communications List) with a data protection element continues to increase. The rise in claim numbers can be attributed to a number of factors including: (i) individuals becoming more aware of their rights under data protection legislation, (ii) uncertainty as to whether individuals may recover damages for a loss of control of their personal data without proving material damage or distress; (iii) the abundance of specialist law firms who are prepared to act for individuals on a "no-win-no-fee" basis and (iv) the availability of After the Event ("ATE") insurance to protect a would-be claimant against adverse costs orders.
Read moreCyber_Bytes - Issue 33
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 32
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 31
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 30
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 29
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 28
Welcome to latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 27
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 26
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 25
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 24
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 23
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks.
Read moreCyber_Bytes - Issue 22
Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 21
Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 19
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks.
Read moreSchrems II – Groundhog Day for Data Transfers
On Thursday 16 July, the Court of Justice of the European Union (“CJEU”) delivered its judgment in one of the most highly anticipated court cases in data protection, Case C-311/18 Data Protection Commissioner v Facebook Ireland Limited, Maximillian Schrems (widely referred to as “Schrems II”). This decision came almost 8 months after Advocate General Saugmandsgaard Øe published his Opinion, which albeit not binding, provided a strong indication for the CJEU's judgment.
Read moreRestarting your business and implementing Government guidance to support NHS Test and Trace
In its latest guidance on keeping workers and customers safe during COVID-19 in restaurants, pubs, bars and takeaway services (23 June 2020), the Government has recommended that businesses operating in these sectors keep a temporary record of customers and visitors for 21 days. This will assist NHS Test and Trace with requests for that data if needed.
Read moreCyber bytes - Issue 17
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 16
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 15
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 14
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreStay connected and subscribe to our latest insights and views
Subscribe Here