Cybersecurity, threats and risk management

View Information Law by content type:

Latest Information Law News

Featured Information Law content

Practice notes
A key objective of the General Data Protection Regulation, Regulation (EU) 2016/679 (the EU GDPR) is to achieve a level of consistency in relation to...
Read More >
19th May
Practice notes
Rome II—application and interpretationThis Practice Note is for use when determining applicable law in respect of events giving rise to damage, where...
Read More >
19th May
Practice notes
Investigatory Powers TribunalFor information on the overarching regime for scrunity of the use of powers under the Investigatory Powers Act 2016 (IPA...
Read More >
19th May
Practice notes
Brexit—exiting the EU under Article 50 [Archived]ARCHIVED: This Practice Note has been archived and is not maintained.This Practice Note contains...
Read More >
Produced in partnership with Adam Cygan of University of Leicester 19th May
Practice notes
On 31 January 2020, the UK ceased to be an EU Member State and entered a Brexit implementation period. Due to the extensive similarities between the...
Read More >
19th May
Q&As
Can the board of a co-operative and community benefit society (a registered society) delegate powers to any third party, and can the registered...
Read More >
19th May
Practice notes
Rome Convention—introduction and interpretation [Archived]ARCHIVED: This Practice Note has been archived and is not maintained.The UK is no longer...
Read More >
19th May
Precedents
In briefThis precedent links to: •a template created by the UK Information Commissioner’s Office (ICO) of the ‘Set II’ or ‘2004’ EU Standard...
Read More >
19th May
Practice notes
The internet and, in particular, social media is a high risk area for defamation litigation. Content posted on blogs, internet forums, online...
Read More >
Produced in partnership with 5RB 19th May
Practice notes
Introduction to retained EU lawThis Practice Note provides an introduction to retained EU law. It provides an overview of the key definitions and...
Read More >
Produced in partnership with Dr. Kieran Laird of Gowling WLG 19th May
Practice notes
Many companies and government bodies (such as HMRC) have been exposed to loss of confidential information and many other breaches of confidentiality...
Read More >
19th May
Practice notes
Requirements of the company sealThis Practice Note provides practical guidance regarding the requirements of the company seal. Where a company has a...
Read More >
19th May
Practice notes
SubcontractingThis Practice Note examines the following legal and practical matters in relation to entering into a subcontract or when granting...
Read More >
19th May
Precedents
[IN THE HIGH COURT OF JUSTICE[BUSINESS AND PROPERTY COURTS [OF ENGLAND AND WALES OR IN [insert location]]][Specify division][Specify specialist...
Read More >
19th May
Practice notes
The tort of misuse of private information is the principal cause of action relied on to protect privacy rights, at least against defendants who are...
Read More >
Produced in partnership with Ben Gallop and Lily Walker-Parr of 5RB 19th May
Practice notes
Privacy law—misuse of private informationThe tort of misuse of private information is focused on ‘the protection of human autonomy and dignity—the...
Read More >
Produced in partnership with Ben Gallop and Lily Walker-Parr of 5RB and Daniel Bishop 19th May

Most recent Cybersecurity, threats and risk management content

Practice notes
Appointment and powers of FCA investigators in criminal casesThe Financial Conduct Authority (FCA) has a wide-ranging brief, which includes the...
Read More >
18th Jun
Practice notes
Electronic signaturesCoronavirus (COVID-19): This Practice Note contains guidance on subjects potentially impacted by procedural changes in response...
Read More >
14th Jun
Precedents
Letter notifying data subject of data breach under PECR 2003Letter notifying data subject of data breach under the Privacy and Electronic...
Read More >
Produced in partnership with Pritchetts Law 9th Jun
Practice notes
Copyright infringementThe Copyright, Designs and Patents Act 1988 (CDPA 1988) gives the copyright owner exclusive rights in the UK to carry out...
Read More >
8th Jun
Precedents
Personal data breach plan1Introduction1.1This personal data breach plan:1.1.1places obligations on staff to report actual or suspected personal data...
Read More >
6th Jun
Practice notes
Managing personal data breachesData security is a cornerstone of the UK General Data Protection Regulation (UK GDPR). The sixth data protection...
Read More >
6th Jun
Precedents
Public statement on data breachStatement by [insert name of organisation] concerning a significant [cyber attack OR data protection breach] on [insert...
Read More >
6th Jun
Q&As
What is the EU law on data scraping from websites?What is scraping?Web scraping is a process by which website data is extracted (ie copied) using a...
Read More >
6th Jun
Practice notes
Bring your own device (BYOD)What is BYOD?'Bring your own device' (BYOD) refers to arrangements where an organisation allows designated employees to...
Read More >
6th Jun
Practice notes
Norwich Pharmacal Orders and online service providersIP COMPLETION DAY: 11pm (GMT) on 31 December 2020 marks the end of the Brexit...
Read More >
Produced in partnership with Tom Ohta of BT and Toby Headdon, Faye Harrison and Harry Taylor of Bristows LLP 5th Jun
Practice notes
The EU NIS Directive and UK NIS Regulations—timelineThis timeline sets out key dates and information relating to:•the EU’s Network and Information...
Read More >
5th Jun
Practice notes
Cybercrime incident managementThough taking preventative steps obviously makes good sense (see Practice Note: Cybercrime prevention), it is not...
Read More >
5th Jun
Practice notes
Managing a breach of confidentiality or information securityMany companies and government bodies (such as HMRC) have been exposed to loss of...
Read More >
5th Jun
Precedents
Letter notifying data breach to insurerLetter notifying data breach to insurers[Data insurer’s name and address][Date]Dear [insert organisation...
Read More >
5th Jun
Practice notes
Digital Economy Act 2010 and website blocking [Archived]ARCHIVED: This archived Practice Note provides information on the Digital Economy Act 2010 and...
Read More >
5th Jun
Practice notes
Website blocking ordersBackgroundThe ability to block websites is within the power of the internet service providers (ISPs) who provide the service of...
Read More >
Produced in partnership with Daniel Byrne of AA Thornton 5th Jun
Practice notes
The Network and Information Systems Regulations 2018This Practice Note provides an overview of the Network and Information Systems Regulations 2018...
Read More >
5th Jun
Practice notes
Copyright criminal offencesFor offences that have more of a public policy angle such as those involving counterfeit goods and piracy, it is possible...
Read More >
5th Jun
Practice notes
Cybersecurity regulation and best practice in the US and UKBREXIT: 11pm (GMT) on 31 December 2020 (‘IP completion day’) marked the end of the Brexit...
Read More >
Produced in partnership with Jennifer Archie, Lore Leitner and Alexander Stout of Latham and Watkins LLP 5th Jun

Popular documents