Cybercrime

View Corporate Crime by content type:

Latest Corporate Crime News

Featured Corporate Crime content

Practice notes
Committal for sentenceSummary of magistrates’ powers to commitA magistrates' court does not have power to impose a sentence of imprisonment or...
Read More >
19th May
Practice notes
Breach of a community orderThis Practice Note reflects the procedural code for sentencing offenders in England and Wales (Sentencing Code) that...
Read More >
19th May
Practice notes
Handling stolen goodsThe ‘handling’ offenceHandling stolen goods is an offence that is triable either way.The elements of the offence are:•dishonestly...
Read More >
19th May
Practice notes
Failing to stop or report an accidentDrivers are under a duty to stop at the scene of an accident, provide personal details and report an accident....
Read More >
Produced in partnership with Red Lion Chambers 19th May
Practice notes
Statutory contempt of courtThe Contempt of Court Act 1981The Contempt of Court Act 1981 (CCA 1981) provides for strict liability contempt or indirect...
Read More >
Produced in partnership with Richard Wayman of Pump Court Chambers 19th May
Practice notes
Indecent images of childrenThe criminal offencesThe Protection of Children Act 1978 (PCA 1978), the Criminal Justice Act 1988 (CJA 1988) and the...
Read More >
19th May
Practice notes
Applying for the return of seized cashApplication by the person from whom the cash was seizedWhen cash has been seized, an application can be made by...
Read More >
19th May
Practice notes
False accounting and false statements under TA 1968False accountingA person who falsifies or conceals information required for an accounting purpose,...
Read More >
19th May
Practice notes
Witness intimidationIntimidation of witnesses and jurorsIntimidation of witnesses and/or jurors is an offence under section 51 of the Criminal Justice...
Read More >
Produced in partnership with Thomas Evans of 3 Paper Buildings 19th May
Practice notes
European Investigation Orders (EIOs)—process [Archived]ARCHIVED: This Practice Note has been archived and is not being maintained. Following the end...
Read More >
19th May
Practice notes
Securities, sureties and other conditions of bailConditions of bailA defendant granted bail by the court may be required to comply with conditions of...
Read More >
Produced in partnership with Alistair Grainger of 25 Bedford Row 19th May
Practice notes
Conducting an appeal in the Court of Appeal Criminal Division (CACD)Coronavirus (COVID-19): This Practice Note contains guidance impacted by the...
Read More >
19th May
Practice notes
Starting an appeal in the Court of Appeal Criminal Division (CACD)Coronavirus (COVID-19): This Practice Note contains guidance impacted by the...
Read More >
19th May
Practice notes
Appeal by way of case statedA challenge to a decision of the lower courts can be brought in various ways, including by way of appeal, judicial review...
Read More >
19th May
Practice notes
Supplying a controlled drug and offering to supplyThe offence of supplying controlled drugs The section 4 of the Misuse of Drugs Act 1971 (MDA 1971)...
Read More >
19th May
Practice notes
Disclosure orders under the Proceeds of Crime Act 2002What is a disclosure order?A disclosure order is, in general terms, an order authorising a...
Read More >
19th May

Most recent Cybercrime content

Q&As
Do I need to report a data breach to the ICO during the coronavirus (COVID-19) epidemic?This Q&A considers whether commercial organisations are...
Read More >
5th Jun
Q&As
How can I ensure my organisation and staff stay safe while using video-conferencing during the coronavirus (COVID-19) pandemic?With the urgent move to...
Read More >
5th Jun
Q&As
What cybercrime risks do I need to consider during a pandemic (eg coronavirus (COVID-19))?This Q&A sets out cybercrime threats which are relevant to...
Read More >
5th Jun
Q&As
What does Brexit mean for cybercrime and cybersecurity?The UK has left the EU on the basis of the Withdrawal Agreement as implemented in the European...
Read More >
5th Jun
Practice notes
Cybercrime incident managementThough taking preventative steps obviously makes good sense (see Practice Note: Cybercrime prevention), it is not...
Read More >
5th Jun
Practice notes
The risks of cryptoassets from a financial crime, money laundering and terrorist financing perspectiveWhat are cryptoassets?One of the hurdles in...
Read More >
5th Jun
Practice notes
Trade mark offencesFor certain types of trade mark infringement cases (such as wilful infringement for the purpose of manufacturing counterfeit...
Read More >
5th Jun
Practice notes
DeepfakesThis Practice Note considers the following legal issues, technical information and applications of deepfakes:•What is a deepfake?•How...
Read More >
Produced in partnership with Kelsey Farish of DAC Beachcroft 5th Jun
Practice notes
Copyright criminal offencesFor offences that have more of a public policy angle such as those involving counterfeit goods and piracy, it is possible...
Read More >
5th Jun
Practice notes
Cybersecurity breach notification requirementsIP COMPLETION DAY: 11pm (GMT) on 31 December 2020 marks the end of the Brexit transition/implementation...
Read More >
Produced in partnership with Chris Benn of Fieldfisher and Nicola Fulford of Hogan Lovells 5th Jun
Practice notes
Cybercrime—issues, threats and vulnerabilitiesCybercrime is a challenge for internal compliance teams requiring a wider response than, ‘it’s a job for...
Read More >
5th Jun
Practice notes
Cybercrime who's whoThe rapid growth of the internet has transformed the way we work. Indeed, the UK has one of the most internet-based economies in...
Read More >
5th Jun
Practice notes
The regulatory approach to data security in financial servicesLegislative framework for data securityGeneral Data Protection Regulation The General...
Read More >
5th Jun
Practice notes
A-Z of cyber threatsThis Practice Note is intended as a quick guide which outlines the main cyber threats commercial organisations face, and...
Read More >
5th Jun
Practice notes
Cybercrime hot-spot: corporate financeCorporate finance transactions are a prime target for cyber criminals due to the:•number of people...
Read More >
5th Jun
Practice notes
Extreme pornographyPossessing extreme pornographySimple possession of extreme pornography is an offence under section 63 of the Criminal Justice and...
Read More >
5th Jun
Practice notes
ForgeryOffence of making a false instrumentA person is guilty of forgery under section 1 of the Forgery and Counterfeiting Act 1981 (FCA 1981) if he...
Read More >
5th Jun
Practice notes
Fraud by false representationFraud by false representationFraud by false representation applies to a broader range of conduct than the offences under...
Read More >
5th Jun
Practice notes
Copyright theft and video piracyCopyright theftTheft of copyright is criminalised by the Copyright, Designs and Patents Act 1988 (CDPA 1988), the...
Read More >
5th Jun
Practice notes
Fraud by failure to disclose and abuse of positionFraud by failure to disclose information while under a legal duty to do so An offence of fraud by...
Read More >
5th Jun

Popular documents