Search results
213 results ordered by
UK ICO and CMA release joint position paper on harmful design in digital markets
What are the impacts of the ICO and CMA joint position paper on “Harmful Design in Digital Markets” and what action should companies take in light of its guidance?
Read moreNew Development: Updated ICO guidance on “likely to be accessed by children”
Following consultation, the ICO has updated its guidance “Likely to be accessed’ by children – FAQs, list of factors and case studies”.
Read moreCyber_Bytes - Issue 57
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreChanges to the One Stop Shop
In July 2023 the European Commission issued a Proposal for a Regulation of the European Parliament and of the Council laying down additional procedural rules relating to the enforcement of Regulation (EU) 2016/679 (the 'GDPR' Regulations).
Read moreRansoms and Sanctions and Fines (oh my!)
Ransomware attacks are happening all the time. Just the other month, the Cl0p ransomware gang claimed responsibility for the exploitation of a zero-day vulnerability in the MOVEit Transfer tool.
Read moreRansoms and Sanctions and Fines (oh my!)
Ransomware attacks are happening all the time. Just the other month, the Cl0p ransomware gang claimed responsibility for the exploitation of a zero-day vulnerability in the MOVEit Transfer tool.
Read moreCyber_Bytes - Issue 56
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreOfcom faces 30,000 cyber attacks a week, new data reveals
NCSC warn that UK infrastructure and businesses face heightened threat of cyber attacks
Read moreCyber_Bytes - Issue 55
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreICO publishes new guidance on privacy in the product design lifecycle
What are the key privacy considerations that the Information Commissioner’s Office (ICO) expects organisations to implement in the design and development of their new products and services?
Read moreThe new Data Act and the EU’s vision for non-personal data sharing in Europe
What does the proposed EU Data Act mean for the usage and sharing of non-personal data by businesses?
Read moreICO updates its guidance on AI and data protection
What are the key data protection principles which the Information Commissioner’s Office (ICO) expects organisations to follow when integrating AI into their product and service offerings?
Read moreICO’s new draft guidance on “likely to be accessed by children” under the Age Appropriate Design Code
When will an online service fall within the scope of the Age Appropriate Design Code?
Read moreEuropean Data Protection Board updates guidance on data breach notifications
How does the recent update to the European Data Protection Board (EDPB) guidance impact data breach notifications for businesses?
Read moreCJEU rules on right to compensation under Article 82 EU GDPR
What must a data subject demonstrate to claim compensation for non-material damage (eg emotional distress/loss of confidence) under the EU General Data Protection Regulation (GDPR)?
Read moreIrish Data Protection Commission decision muddies the water for Meta’s EU-US data transfers
What are the implications of the Irish Data Protection Commission’s (IDPC) ruling against Meta for data transfers from the EU/EEA to the US in breach of the EU GDPR?
Read moreEU Data Protection Board guidance on international data transfers
How does the recent guidance issued by the European Data Protection Board (EDPB) assist businesses in complying with the EU GDPR when carrying out international data transfers?
Read moreOpinions aplenty on the European Commission’s draft adequacy decision regarding the EU-US Data Privacy Framework
How have the EU law-making institutions reacted to the draft adequacy decision regarding the EU-US Data Privacy Framework (DPF)?
Read moreItalian Data Protection Authority issues fine for use of dark patterns
How can companies ensure that their websites, apps and other online interfaces comply with regulations restricting the use of dark patterns when collecting consent to the processing of personal data?
Read moreCyber_Bytes - Issue 54
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 53
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 52
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreICO publishes guidance on compliance of game design with the Children’s Code
What steps can game designers take to ensure their games comply with the Children’s Code?
Read moreCyber_Bytes - Issue 51
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 50
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCloud computing in business: A silver lining?
Cloud computing is a resource that businesses have rapidly adopted as a major step towards completing their digitalisation.
Read moreRPC Law x Web3: Gambling regulations – Don't Play Games of Chance with the Law
This is part of a series of RPC x Web3 articles designed to help Web3 participants and enthusiasts understand their rights in this rapidly evolving space.
Read moreCyber_Bytes - Issue 49
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreThe NIS Regulations to expand to bring outsourced IT providers and managed service providers into scope
The UK's Network and Information Systems ("NIS") Regulations came into force in May 2018 to boost the level of security of network and information systems for the provision of essential services, such as transport, energy, water, health and digital infrastructure ("operators of essential services (OES)"). These Regulations also applied to digital services, such as online marketplaces, online search engines and cloud computing services ("relevant digital service providers (RDSPs)").
Read moreCyber_Bytes - Issue 48
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreRPC Law x Web3: If There's Something Strange in the Web3 World, Who You Gonna Call?
"And the way we win is by creating a new, democratic, decentralised internet, one where the behaviour of companies like this will be impossible forever. One where it is the users, not the kings, who have sovereign control over their data." - Richard Hendricks, in the HBO TV Series "Silicon Valley", portrayed by Thomas Middleditch
Read moreCyber_Bytes - Issue 47
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreRPC Law x Web3: Considerations for NFT Founders Building Communities and Providing Utility to Holders
In the past when one purchased an NFT, the only expectation was that he, she, or they was purchasing rights in an asset (usually a digital artwork).
Read moreCyber_Bytes - Issue 46
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreRecent developments in data subject litigation caselaw
Two interesting recent developments in the case law relating to data subject litigation. These further undermine the viability of low-value claims for personal data breaches for claimant law firms.
Read moreCyber_Bytes - Issue 45
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreRPC Law x Web3: Ownership of Digital Assets in Web3
This is the inaugural part of a series of articles relating to legal issues around Web3. Over the course of the next few months, will hope to provide you with some thoughts and insights on the areas of Web3 where potential legal issues may arise based on current laws.
Read moreSingapore data protection update
New guidance from the Court of Appeal for parties involved in an action against another individual for loss and damage suffered as a result of a contravention of the provisions of the PDPA.
Read moreCyber_Bytes - Issue 44
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 43
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber Incident Reporting Obligations for Hong Kong Licensed Financial Services Companies
The number of cyber-attacks is on the rise. In particular, financial services companies have been identified as key targets for threat actors in the Q2 of 2022.
Read moreChanges to data protection legislation in Asia – 2022 update (including Mainland China)
Looking back on the last 18 months, the data privacy laws of several Asian jurisdictions have been updated to incorporate stronger protections for individuals’ personal data. This article provides an update on a handful of jurisdictions in Asia and summarises some of those main changes, including the far-reaching implications of the new data protection law in Mainland China.
Read moreCyber_Bytes - Issue 42
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreHong Kong data protection: cross-border transfers of personal data
We take a closer look at businesses' obligations under Hong Kong law to protect personal data in a cross-border transfer and the new recommended model contractual clauses.
Read moreCyber_Bytes - Issue 41
Welcome to latest edition of Cyber_Bytes, our regular round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 40
Welcome to latest edition of Cyber_Bytes, our regular round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 39
Welcome to latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreEDPB guidelines on personal data breach notifications
Last month, the EDPB published their "Guidelines on Examples regarding Personal Data Breach Notification" (the Guidelines). These are intended to provide "practice-oriented, case-based" guidance on when it is necessary to notify the relevant supervisory authorities (the SA) under Article 33(1) of the GDPR and/or data subjects under Article 34(1) of the GDPR following a personal data breach.
Read moreCyber_Bytes - Issue 38
We are back following a short seasonal break and hope you enjoy this latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 37
We hope you enjoy this latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreStay connected and subscribe to our latest insights and views
Subscribe Here