Cybersecurity, threats and risk management

View Information Law by content type:

Latest Information Law News

Featured Information Law content

Practice notes
A key objective of the General Data Protection Regulation, Regulation (EU) 2016/679 (the EU GDPR) is to achieve a level of consistency in relation to...
Read More >
19th May
Practice notes
Rome II—application and interpretationThis Practice Note is for use when determining applicable law in respect of events giving rise to damage, where...
Read More >
19th May
Practice notes
Investigatory Powers TribunalFor information on the overarching regime for scrunity of the use of powers under the Investigatory Powers Act 2016 (IPA...
Read More >
19th May
Practice notes
Brexit—exiting the EU under Article 50 [Archived]ARCHIVED: This Practice Note has been archived and is not maintained.This Practice Note contains...
Read More >
Produced in partnership with Adam Cygan of University of Leicester 19th May
Practice notes
On 31 January 2020, the UK ceased to be an EU Member State and entered a Brexit implementation period. Due to the extensive similarities between the...
Read More >
19th May
Q&As
Can the board of a co-operative and community benefit society (a registered society) delegate powers to any third party, and can the registered...
Read More >
19th May
Practice notes
Rome Convention—introduction and interpretation [Archived]ARCHIVED: This Practice Note has been archived and is not maintained.The UK is no longer...
Read More >
19th May
Precedents
In briefThis precedent links to: •a template created by the UK Information Commissioner’s Office (ICO) of the ‘Set II’ or ‘2004’ EU Standard...
Read More >
19th May
Practice notes
The internet and, in particular, social media is a high risk area for defamation litigation. Content posted on blogs, internet forums, online...
Read More >
Produced in partnership with 5RB 19th May
Practice notes
Introduction to retained EU lawThis Practice Note provides an introduction to retained EU law. It provides an overview of the key definitions and...
Read More >
Produced in partnership with Dr. Kieran Laird of Gowling WLG 19th May
Practice notes
Many companies and government bodies (such as HMRC) have been exposed to loss of confidential information and many other breaches of confidentiality...
Read More >
19th May
Practice notes
Requirements of the company sealThis Practice Note provides practical guidance regarding the requirements of the company seal. Where a company has a...
Read More >
19th May
Practice notes
SubcontractingThis Practice Note examines the following legal and practical matters in relation to entering into a subcontract or when granting...
Read More >
19th May
Precedents
[IN THE HIGH COURT OF JUSTICE[BUSINESS AND PROPERTY COURTS [OF ENGLAND AND WALES OR IN [insert location]]][Specify division][Specify specialist...
Read More >
19th May
Practice notes
The tort of misuse of private information is the principal cause of action relied on to protect privacy rights, at least against defendants who are...
Read More >
Produced in partnership with Ben Gallop and Lily Walker-Parr of 5RB 19th May
Practice notes
Privacy law—misuse of private informationThe tort of misuse of private information is focused on ‘the protection of human autonomy and dignity—the...
Read More >
Produced in partnership with Ben Gallop and Lily Walker-Parr of 5RB and Daniel Bishop 19th May

Most recent Cybersecurity, threats and risk management content

Practice notes
Electronic signaturesCoronavirus (COVID-19): This Practice Note contains guidance on subjects potentially impacted by procedural changes in response...
Read More >
14th Jun
Precedents
Letter notifying data subject of data breach under PECR 2003Letter notifying data subject of data breach under the Privacy and Electronic...
Read More >
Produced in partnership with Pritchetts Law 9th Jun
Precedents
Personal data breach plan1Introduction1.1This personal data breach plan:1.1.1places obligations on staff to report actual or suspected personal data...
Read More >
6th Jun
Practice notes
Managing personal data breachesData security is a cornerstone of the UK General Data Protection Regulation (UK GDPR). The sixth data protection...
Read More >
6th Jun
Precedents
Public statement on data breachStatement by [insert name of organisation] concerning a significant [cyber attack OR data protection breach] on [insert...
Read More >
6th Jun
Practice notes
Bring your own device (BYOD)What is BYOD?'Bring your own device' (BYOD) refers to arrangements where an organisation allows designated employees to...
Read More >
6th Jun
Practice notes
Cybercrime incident managementThough taking preventative steps obviously makes good sense (see Practice Note: Cybercrime prevention), it is not...
Read More >
5th Jun
Practice notes
Managing a breach of confidentiality or information securityMany companies and government bodies (such as HMRC) have been exposed to loss of...
Read More >
5th Jun
Precedents
Letter notifying data breach to insurerLetter notifying data breach to insurers[Data insurer’s name and address][Date]Dear [insert organisation...
Read More >
5th Jun
Practice notes
Cybersecurity regulation and best practice in the US and UKBREXIT: 11pm (GMT) on 31 December 2020 (‘IP completion day’) marked the end of the Brexit...
Read More >
Produced in partnership with Jennifer Archie, Lore Leitner and Alexander Stout of Latham and Watkins LLP 5th Jun
Practice notes
FCA telephone and electronic communication recording requirementsBREXIT: 11pm (GMT) on 31 December 2020 (‘IP completion day’) marked the end of the...
Read More >
5th Jun
Practice notes
Cybercrime—issues, threats and vulnerabilitiesCybercrime is a challenge for internal compliance teams requiring a wider response than, ‘it’s a job for...
Read More >
5th Jun
Practice notes
Cybercrime who's whoThe rapid growth of the internet has transformed the way we work. Indeed, the UK has one of the most internet-based economies in...
Read More >
5th Jun
Practice notes
The regulatory approach to data security in financial servicesLegislative framework for data securityGeneral Data Protection Regulation The General...
Read More >
5th Jun
Practice notes
Energy sector operators of essential services under the Network and Information Systems Regulations 2018IntroductionThe Network and Information...
Read More >
5th Jun
Practice notes
Copyright theft and video piracyCopyright theftTheft of copyright is criminalised by the Copyright, Designs and Patents Act 1988 (CDPA 1988), the...
Read More >
5th Jun
Precedents
Policy—social mediaIP COMPLETION DAY: 11pm (GMT) on 31 December 2020 marks the end of the Brexit transition/implementation period entered into...
Read More >
5th Jun
Precedents
Information and cybersecurity—supplier questionnaireIP COMPLETION DAY: 11pm (GMT) on 31 December 2020 marks the end of the Brexit...
Read More >
5th Jun
Precedents
Cybercrime prevention strategy and incident management plan1Introduction1.1This strategy and plan builds on and supplements our other data management...
Read More >
5th Jun

Popular documents