Cybersecurity, threats and risk management

Featured guidance
Cybersecurity, threats and risk management guidance:

The Financial Conduct Authority (FCA) has a wide-ranging brief, which includes the ability to enforce compliance with its rules and competition law in order to meet its...

Practice Note

ThreatWhat is it?Our defensive measures BotnetCollection of infected computers remotely controlled by a hacker.The hacker can share or sell access to the computers to...

Precedents

This Practice Note explores the effect of Brexit on UK cybersecurity with a particular focus on the network and information systems legislation. It covers: • overview of...

Practice Note

Brexit: As of exit day (31 January 2020), the UK is no longer an EU Member State, but it has entered an implementation period during which it continues to be treated by...

Practice Note

Background The Computer Misuse Act 1990 (CMA 1990) was principally enacted in response to the threat of unauthorised access to computers, colloquially known as ‘hacking’...

Practice Note

While there are other remedies available to claimants in breach of confidence cases, an injunction preventing publication of the relevant information is often the only...

Practice Note

For offences that have more of a public policy angle such as those involving counterfeit goods and piracy, it is possible to bring criminal as well as civil proceedings....

Practice Note

The Copyright, Designs and Patents Act 1988 (CDPA 1988) gives the copyright owner exclusive rights in the UK to carry out various acts in relation to the copyright work....

Practice Note

Copyright theft Theft of copyright is criminalised by the Copyright, Designs and Patents Act 1988 (CDPA 1988), the Trade Marks Act 1994 (TMA 1994) and the Video...

Practice Note

Whereas primary infringement requires in most instances reproduction, secondary infringement is about dealing commercially in infringing copyright works. Acts of...

Practice Note

Brexit: As of exit day (31 January 2020), the UK is no longer an EU Member State, but it has entered an implementation period during which it continues to be treated by...

Practice Note

1 Introduction 1.1 This strategy and plan builds on and supplements our other data management and security policies and procedures, namely our: 1.1.1 [[Data protection...

Precedents

The rapid growth of the internet has transformed the way we work. Indeed, the UK has one of the most internet-based economies in the world, with the UK internet market...

Practice Note

Brexit: As of exit day (31 January 2020), the UK is no longer an EU Member State, but it has entered an implementation period during which it continues to be treated by...

Practice Note

Brexit: On 31 January 2020, the UK ceased to be an EU Member State and entered an implementation period, during which it continues to be subject to EU laws, including...

Practice Note

Introduction to cybersecurity in financial services firms In the wake of continued escalations in phishing and denial of service attacks against banks and other financial...

Practice Note

ARCHIVED: This archived Practice Note provides information on the Digital Economy Act 2010 and early s 97A website blocking. This Practice Note is for background...

Practice Note

Coronavirus (COVID-19): This Practice Note contains guidance on subjects potentially impacted by procedural changes in response to the coronavirus (COVID-19) outbreak....

Practice Note

Introduction The Network and Information Systems Regulations 2018 (NIS Regulations), SI 2018/506, implement in the UK certain EU derived cybersecurity requirements...

Practice Note

BREXIT: As of exit day (31 January 2020) the UK is no longer an EU Member State. However, in accordance with the Withdrawal Agreement, the UK has entered an...

Practice Note

Brexit: As of exit day (31 January 2020), the UK is no longer an EU Member State, but it has entered an implementation period during which it continues to be treated by...

Practice Note

1 Background information Name of[ prospective] supplier[To be completed by customer] Address[To be completed by customer] Brief description of services[ to be]...

Precedents

The Investigatory Powers Act 2016 (IPA 2016) overhauled the legal framework governing the use of covert surveillance by public bodies, a framework which is largely, but...

Practice Note

Produced in partnership with Pritchetts Law Letter notifying data subject of data breach under the Privacy and Electronic Communications Regulations 2003, SI 2003/2426...

Precedents

[Insert name and address of recipient] Dear [insert organisation name], [Name of client] and confidential information 1 We are instructed by [insert name of client] of...

Precedents

Letter of claim [Alleged infringer’s name and address] [Date] Dear [insert organisation name] Copyright infringement: [Name and description of copyright works] We are...

Precedents

Letter of claim [Alleged infringer’s name and address] [Date] Dear [insert organisation name] Copyright infringement: [Name and description of copyright works] We are...

Precedents

Many companies and government bodies (such as HMRC) have been exposed to loss of confidential information and many other breaches of confidentiality occur but they are...

Practice Note

The Data Protection Act 2018 (DPA 2018) creates a number of criminal offences relating to the misuse of personal data in the UK. For information on these specific...

Practice Note

This Practice Note considers some of the specific issues that may arise in the context of Norwich Pharmacal applications against online service providers. For further...

Practice Note
Trending Topics
In-House COVID-19