Introduction to enforcement

How to approach enforcement

Enforcement is not something that should be considered only once a judgment or order has been obtained from the court. Instead, it should feature at the outset of initial investigation of a claim since it may dictate whom you sue, where, how and for what remedy.

For further guidance on the need to know your defendant and the tools available for obtaining information about your judgment debtor post judgment, see Practice Note: Successful enforcement—knowing your defendant.

We also provide a Checklist of considerations relevant when bringing a claim to an end: Ending a claim—checklist.

Which enforcement method to choose?

There are many methods of enforcement available under the CPR. The key to successful enforcement of a judgment is choosing the most appropriate method of enforcement. This will depend on the nature of the judgment,

To view the latest version of this document and thousands of others like it, sign-in with LexisNexis or register for a free trial.

Powered by Lexis+®
Latest Dispute Resolution News

Arbitration—restraining arbitration proceedings pending a removal application or procedural challenge (A v B & another)

Arbitration analysis: In this decision, the Commercial Court refused to stay or restrain two London Court of International Arbitration (LCIA) arbitrations pending determination of applications under sections 24 and 68 of the Arbitration Act 1996 (AA 1996). Party A had sought what it described as a ‘stay’ under CPR 3.1(2)(g), contending that the arbitrations should not proceed while the court considered an application to remove the sole arbitrator and a serious irregularity challenge. Mr Justice Butcher held that CPR 3.1(2)(g) applies only to court proceedings and cannot be invoked to stay arbitral proceedings. Properly characterised, the relief sought was an injunction restraining further pursuit of the arbitrations. The judge doubted whether the court had jurisdiction to grant such relief, given s 1(c) (the principle of non-intervention) and s 24(3), which expressly permits arbitral proceedings to continue while a removal application is pending. In any event, even if such jurisdiction existed, it could only be exercised in exceptional circumstances (for example, where continuation would be vexatious, oppressive or unconscionable), and no such circumstances were made out. The decision underlines the strict limits on judicial intervention in ongoing arbitrations and confirms that the mere existence of s 24 or s 68 applications / challenges will not justify interrupting the arbitral process. Practitioners should note the court’s clear refusal to assume any supervisory role over arbitral procedure prior to an award. Written by Oliver Browne, partner, at Paul Hastings (Europe) LLP.

Data by any other name—Court of Appeal reverses Upper Tribunal’s ruling on the protection of ‘personal data’ (DSG v ICO)

Information Law analysis: In this case, the Court of Appeal unanimously allowed the appeal brought by the Information Commissioner’s Office (ICO), holding that it is sufficient that data which has been subjected to unauthorised or unlawful processing by a third party still constitutes personal data from the perspective of the data controller, even if it is pseudonymised ‘in the hands of’ the data controller and therefore anonymised ‘in the hands of’ the attacker. Accordingly, the court held, the data controller is required to take ‘appropriate technical and organisational measures’ (ATOMs) to protect that personal data against such hackers, even where those third parties cannot themselves identify the individuals to whom the data relates. Even though this judgment is under the Data Protection Act 1998 (DPA 1998), this decision is significant as it confirms, in terms equally applicable to the United Kingdom General Data Protection Regulation, Assimilated Regulation (EU) 2016/679 (UK GDPR), that the scope of the security obligation is not diminished merely because stolen or exfiltrated data would be anonymised in the hands of the third party with unlawful access. This development expands and makes more pressing the obligation on controllers to assess and guard against a broader range of threats—including ransomware, data destruction, and bulk exfiltration, regardless of the attacker's capacity to re-identify data subjects. Written by Adelaide Lopez, senior associate at Wiggin LLP.

View Dispute Resolution by content type :

Popular documents