Cybersecurity

Featured guidance
Cybersecurity guidance:

The Financial Conduct Authority (FCA) has a wide-ranging brief, which includes the ability to enforce compliance with its rules and competition law in order to meet its...

Practice Note

ThreatWhat is it?Our defensive measures BotnetCollection of infected computers remotely controlled by a hacker.The hacker can share or sell access to the computers to...

Precedents

This Practice Note explores the effect of Brexit on UK cybersecurity with a particular focus on the network and information systems legislation. It covers: • overview of...

Practice Note

Brexit: As of exit day (31 January 2020), the UK is no longer an EU Member State, but it has entered an implementation period during which it continues to be treated by...

Practice Note

Background The Computer Misuse Act 1990 (CMA 1990) was principally enacted in response to the threat of unauthorised access to computers, colloquially known as ‘hacking’...

Practice Note

While there are other remedies available to claimants in breach of confidence cases, an injunction preventing publication of the relevant information is often the only...

Practice Note

The Digital Economy Act 2017 (DEA 2017) received Royal Assent on 27 April 2017. DEA 2017 implementation is underway with the publication of the Digital Economy Act 2017...

Practice Note

The Copyright, Designs and Patents Act 1988 (CDPA 1988) gives the copyright owner exclusive rights in the UK to carry out various acts in relation to the copyright work....

Practice Note

Copyright theft Theft of copyright is criminalised by the Copyright, Designs and Patents Act 1988 (CDPA 1988), the Trade Marks Act 1994 (TMA 1994) and the Video...

Practice Note

Whereas primary infringement requires in most instances reproduction, secondary infringement is about dealing commercially in infringing copyright works. Acts of...

Practice Note

Though taking preventative steps obviously makes good sense (see Practice Note: Cybercrime prevention), it is not possible to totally eradicate the risk of cybercrime or...

Practice Note

1 Introduction 1.1 This strategy and plan builds on and supplements our other data management and security policies and procedures, namely our: 1.1.1 [[Data protection...

Precedents

The rapid growth of the internet has transformed the way we work. Indeed, the UK has one of the most internet-based economies in the world, with the UK internet market...

Practice Note

Brexit: As of exit day (31 January 2020), the UK is no longer an EU Member State, but it has entered an implementation period during which it continues to be treated by...

Practice Note

Brexit: On 31 January 2020, the UK ceased to be an EU Member State and entered an implementation period, during which it continues to be subject to EU laws, including...

Practice Note

Introduction to cybersecurity in financial services firms In the wake of continued escalations in phishing and denial of service attacks against banks and other financial...

Practice Note

ARCHIVED: This archived Practice Note provides information on the Digital Economy Act 2010 and early s 97A website blocking. This Practice Note is for background...

Practice Note

Brexit: As of exit day (11pm on 31 January 2020) the UK is no longer an EU Member State. However, in accordance with the Withdrawal Agreement, the UK has entered an...

Practice Note

Introduction The Network and Information Systems Regulations 2018 (NIS Regulations), SI 2018/506, implement in the UK certain EU derived cybersecurity requirements...

Practice Note

BREXIT: As of exit day (31 January 2020) the UK is no longer an EU Member State. However, in accordance with the Withdrawal Agreement, the UK has entered an...

Practice Note

Brexit: As of exit day (31 January 2020), the UK is no longer an EU Member State, but it has entered an implementation period during which it continues to be treated by...

Practice Note

1 Background information Name of[ prospective] supplier[To be completed by customer] Address[To be completed by customer] Brief description of services[ to be]...

Precedents

The Investigatory Powers Act 2016 (IPA 2016) overhauled the legal framework governing the use of covert surveillance by public bodies, a framework which is largely, but...

Practice Note

Produced in partnership with Pritchetts Law Letter notifying data subject of data breach under the Privacy and Electronic Communications Regulations 2003, SI 2003/2426...

Precedents

[Insert name and address of recipient] Dear [insert organisation name], [Name of client] and confidential information 1 We are instructed by [insert name of client] of...

Precedents

Letter of claim [Alleged infringer’s name and address] [Date] Dear [insert organisation name] Copyright infringement: [Name and description of copyright works] We are...

Precedents