Cybersecurity

View Information Law by content type:

Latest Information Law News

Featured Information Law content

Practice notes
A key objective of the General Data Protection Regulation, Regulation (EU) 2016/679 (the EU GDPR) is to achieve a level of consistency in relation to...
Read More >
19th May
Practice notes
Rome II—application and interpretationThis Practice Note is for use when determining applicable law in respect of events giving rise to damage, where...
Read More >
19th May
Practice notes
Investigatory Powers TribunalFor information on the overarching regime for scrunity of the use of powers under the Investigatory Powers Act 2016 (IPA...
Read More >
19th May
Practice notes
Brexit—exiting the EU under Article 50 [Archived]ARCHIVED: This Practice Note has been archived and is not maintained.This Practice Note contains...
Read More >
Produced in partnership with Adam Cygan of University of Leicester 19th May
Practice notes
On 31 January 2020, the UK ceased to be an EU Member State and entered a Brexit implementation period. Due to the extensive similarities between the...
Read More >
19th May
Q&As
Can the board of a co-operative and community benefit society (a registered society) delegate powers to any third party, and can the registered...
Read More >
19th May
Practice notes
Rome Convention—introduction and interpretation [Archived]ARCHIVED: This Practice Note has been archived and is not maintained.The UK is no longer...
Read More >
19th May
Precedents
In briefThis precedent links to: •a template created by the UK Information Commissioner’s Office (ICO) of the ‘Set II’ or ‘2004’ EU Standard...
Read More >
19th May
Practice notes
The internet and, in particular, social media is a high risk area for defamation litigation. Content posted on blogs, internet forums, online...
Read More >
Produced in partnership with 5RB 19th May
Practice notes
Introduction to retained EU lawThis Practice Note provides an introduction to retained EU law. It provides an overview of the key definitions and...
Read More >
Produced in partnership with Dr. Kieran Laird of Gowling WLG 19th May
Practice notes
Many companies and government bodies (such as HMRC) have been exposed to loss of confidential information and many other breaches of confidentiality...
Read More >
19th May
Practice notes
Requirements of the company sealThis Practice Note provides practical guidance regarding the requirements of the company seal. Where a company has a...
Read More >
19th May
Practice notes
SubcontractingThis Practice Note examines the following legal and practical matters in relation to entering into a subcontract or when granting...
Read More >
19th May
Precedents
[IN THE HIGH COURT OF JUSTICE[BUSINESS AND PROPERTY COURTS [OF ENGLAND AND WALES OR IN [insert location]]][Specify division][Specify specialist...
Read More >
19th May
Practice notes
Privacy law—misuse of private informationThe tort of misuse of private information is focused on ‘the protection of human autonomy and dignity—the...
Read More >
Produced in partnership with Ben Gallop and Lily Walker-Parr of 5RB and Daniel Bishop 19th May
Practice notes
The tort of misuse of private information is the principal cause of action relied on to protect privacy rights, at least against defendants who are...
Read More >
Produced in partnership with Ben Gallop and Lily Walker-Parr of 5RB 19th May

Most recent Cybersecurity content

Practice notes
Electronic signaturesCoronavirus (COVID-19): This Practice Note contains guidance on subjects potentially impacted by procedural changes in response...
Read More >
17th Sep
Practice notes
Managing personal data breachesData security is a cornerstone of the UK General Data Protection Regulation (UK GDPR). The sixth data protection...
Read More >
17th Sep
Practice notes
Investigation of encryption protected electronic data under RIPA 2000Although the Investigatory Powers Act 2016 (IPA 2016) repealed and replaced much...
Read More >
16th Sep
Practice notes
The regulatory approach to data security in financial servicesLegislative framework for data securityGeneral Data Protection Regulation The General...
Read More >
14th Sep
Practice notes
Cybersecurity regulation and best practice in the US and UKBREXIT: 11pm (GMT) on 31 December 2020 (‘IP completion day’) marked the end of the Brexit...
Read More >
Produced in partnership with Jennifer Archie, Lore Leitner and Alexander Stout of Latham and Watkins LLP 14th Sep
Practice notes
Brexit—cybersecurityThis Practice Note explores the effect of Brexit on UK cybersecurity with a particular focus on the network and information...
Read More >
13th Sep
Practice notes
The Network and Information Systems Regulations 2018This Practice Note provides an overview of the Network and Information Systems Regulations 2018...
Read More >
13th Sep
Practice notes
The EU NIS Directive and UK NIS Regulations—timelineThis timeline sets out key dates and information relating to:•the EU’s Network and Information...
Read More >
13th Sep
Precedents
Policy—social media (short form)IP COMPLETION DAY: The Brexit transition period ended at 11pm on 31 December 2020. At this time (referred to in UK law...
Read More >
8th Sep
Precedents
Policy—social mediaIP COMPLETION DAY: The Brexit transition period ended at 11pm on 31 December 2020. At this time (referred to in UK law as ‘IP...
Read More >
8th Sep
Practice notes
Computer hacking and misuse under the Computer Misuse Act 1990BackgroundThe Computer Misuse Act 1990 (CMA 1990) was principally enacted in response to...
Read More >
Produced in partnership with Professor Dan Hyde of Harrison Clark Rickerbys 6th Sep
Practice notes
Appointment and powers of FCA investigators in criminal casesThe Financial Conduct Authority (FCA) has a wide-ranging brief, which includes the...
Read More >
24th Aug
Practice notes
Unlawfully obtaining data under the Data Protection Act 1998 [Archived]Archived: This Practice Note has been archived and is not maintained.This...
Read More >
Produced in partnership with Professor Dan Hyde of Harrison Clark Rickerbys 24th Aug
Precedents
Personal data breach plan1Introduction1.1This personal data breach plan:1.1.1places obligations on staff to report actual or suspected personal data...
Read More >
22nd Aug
Precedents
Letter notifying data breach to insurerLetter notifying data breach to insurers[Data insurer’s name and address][Date]Dear [insert organisation...
Read More >
22nd Aug
Q&As
What is the EU law on data scraping from websites?What is scraping?Web scraping is a process by which website data is extracted (ie copied) using a...
Read More >
16th Aug
Practice notes
Digital Economy Act 2010 and website blocking [Archived]ARCHIVED: This archived Practice Note provides information on the Digital Economy Act 2010 and...
Read More >
16th Aug
Practice notes
Website blocking ordersBackgroundThe ability to block websites is within the power of the internet service providers (ISPs) who provide the service of...
Read More >
Produced in partnership with Daniel Byrne of AA Thornton 16th Aug
Precedents
Information and cybersecurity—supplier questionnaireIP COMPLETION DAY: The Brexit transition period ended at 11pm on 31 December 2020. At this time...
Read More >
15th Aug

Popular documents