Cybersecurity

Cyber risk, like any other risk to your business, needs to be managed properly and considered a high priority risk for the internal compliance or legal team—not just the IT department. It is a business risk that must be managed within an overall information risk-management and crime prevention framework.

The guidance and tools referenced reflect information security and breach notification requirements in the UK General Data Protection Regulation (UK GDPR), Assimilated Regulation (EU) 2016/679 and Data Protection Act 2018, but are not intended to cover specialist sector-specific requirements in the:

  1. Network and Information Systems Regulations 2018 (NIS Regulations), SI 2018/506

  2. Privacy and Electronic Communications (EC Directive) Regulations 2003 (PECR 2003), SI 2003/2426 (as amended), or

  3. Financial Services and Markets Act 2000 (FSMA 2000) and the Financial Conduct Authority (FCA) Handbook

What is cybercrime?

Cybercrime is simply a crime that has some kind of computer or cyber aspect to it. It takes shape in a variety of different forms.

  1. one-off—involves theft or manipulation of data or services which appears, from the victim’s perspective, to be a single event, eg malware or phishing

  2. ongoing—a

To view the latest version of this document and thousands of others like it, sign-in with LexisNexis or register for a free trial.

Powered by Lexis+®
Latest Practice Compliance News

Data by any other name—Court of Appeal reverses Upper Tribunal’s ruling on the protection of ‘personal data’ (DSG v ICO)

Information Law analysis: In this case, the Court of Appeal unanimously allowed the appeal brought by the Information Commissioner’s Office (ICO), holding that it is sufficient that data which has been subjected to unauthorised or unlawful processing by a third party still constitutes personal data from the perspective of the data controller, even if it is pseudonymised ‘in the hands of’ the data controller and therefore anonymised ‘in the hands of’ the attacker. Accordingly, the court held, the data controller is required to take ‘appropriate technical and organisational measures’ (ATOMs) to protect that personal data against such hackers, even where those third parties cannot themselves identify the individuals to whom the data relates. Even though this judgment is under the Data Protection Act 1998 (DPA 1998), this decision is significant as it confirms, in terms equally applicable to the United Kingdom General Data Protection Regulation, Assimilated Regulation (EU) 2016/679 (UK GDPR), that the scope of the security obligation is not diminished merely because stolen or exfiltrated data would be anonymised in the hands of the third party with unlawful access. This development expands and makes more pressing the obligation on controllers to assess and guard against a broader range of threats—including ransomware, data destruction, and bulk exfiltration, regardless of the attacker's capacity to re-identify data subjects. Written by Adelaide Lopez, senior associate at Wiggin LLP.

View Practice Compliance by content type :

Popular documents