Search results
177 results ordered by
Cyber_Bytes - Issue 43
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreCyber Incident Reporting Obligations for Hong Kong Licensed Financial Services Companies
The number of cyber-attacks is on the rise. In particular, financial services companies have been identified as key targets for threat actors in the Q2 of 2022.
Read moreChanges to data protection legislation in Asia – 2022 update (including Mainland China)
Looking back on the last 18 months, the data privacy laws of several Asian jurisdictions have been updated to incorporate stronger protections for individuals’ personal data. This article provides an update on a handful of jurisdictions in Asia and summarises some of those main changes, including the far-reaching implications of the new data protection law in Mainland China.
Read moreCyber_Bytes - Issue 42
Welcome to Cyber_Bytes, our regular round-up of key developments in cyber, tech and evolving risks.
Read moreHong Kong data protection: cross-border transfers of personal data
We take a closer look at businesses' obligations under Hong Kong law to protect personal data in a cross-border transfer and the new recommended model contractual clauses.
Read moreCyber_Bytes - Issue 41
Welcome to latest edition of Cyber_Bytes, our regular round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 40
Welcome to latest edition of Cyber_Bytes, our regular round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 39
Welcome to latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreEDPB guidelines on personal data breach notifications
Last month, the EDPB published their "Guidelines on Examples regarding Personal Data Breach Notification" (the Guidelines). These are intended to provide "practice-oriented, case-based" guidance on when it is necessary to notify the relevant supervisory authorities (the SA) under Article 33(1) of the GDPR and/or data subjects under Article 34(1) of the GDPR following a personal data breach.
Read moreCyber_Bytes - Issue 38
We are back following a short seasonal break and hope you enjoy this latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 37
We hope you enjoy this latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 36
We are back following a break and hope you enjoy this latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreThe Supreme Court hands down judgment in Lloyd v Google
In a keenly anticipated judgment that has significant ramifications for UK data protection, the Supreme Court has today overturned the Court of Appeal's decision in Lloyd v Google and restored the original order made by the High Court, refusing the claimant's application for permission to serve proceedings on Google outside the jurisdiction.
Read moreCyber_Bytes - Issue 35
We hope you enjoy this latest edition of Cyber Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 34
We hope you enjoy this latest edition of Cyber_Bytes, our biweekly roundup of key developments in cyber, tech and evolving risks.
Read moreCase comment: striking out of privacy and confidence actions in the Dixons data breach case
The number of claims issued in the High Court (Media and Communications List) with a data protection element continues to increase. The rise in claim numbers can be attributed to a number of factors including: (i) individuals becoming more aware of their rights under data protection legislation, (ii) uncertainty as to whether individuals may recover damages for a loss of control of their personal data without proving material damage or distress; (iii) the abundance of specialist law firms who are prepared to act for individuals on a "no-win-no-fee" basis and (iv) the availability of After the Event ("ATE") insurance to protect a would-be claimant against adverse costs orders.
Read moreCyber_Bytes - Issue 33
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 32
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 31
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 30
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 29
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 28
Welcome to latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreUpcoming changes to data protection legislation in Asia
The data privacy landscape in Asia is varied, complex and evolving. We are already seeing the wheels of change in motion as the data privacy laws of several Asian jurisdictions are being updated to reflect more closely the European data protection regime. This article summarises some of those changes.
Read moreCyber_Bytes - Issue 27
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 26
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 25
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 24
Welcome to Cyber_Bytes, our bi-weekly round up of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 23
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks.
Read moreCyber_Bytes - Issue 22
Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 21
Welcome to the latest edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 19
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the last two weeks.
Read moreSchrems II – Groundhog Day for Data Transfers
On Thursday 16 July, the Court of Justice of the European Union (“CJEU”) delivered its judgment in one of the most highly anticipated court cases in data protection, Case C-311/18 Data Protection Commissioner v Facebook Ireland Limited, Maximillian Schrems (widely referred to as “Schrems II”). This decision came almost 8 months after Advocate General Saugmandsgaard Øe published his Opinion, which albeit not binding, provided a strong indication for the CJEU's judgment.
Read moreRestarting your business and implementing Government guidance to support NHS Test and Trace
In its latest guidance on keeping workers and customers safe during COVID-19 in restaurants, pubs, bars and takeaway services (23 June 2020), the Government has recommended that businesses operating in these sectors keep a temporary record of customers and visitors for 21 days. This will assist NHS Test and Trace with requests for that data if needed.
Read moreCyber bytes - Issue 17
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 16
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 15
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber bytes - Issue 14
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber Bytes - Issue 13
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber Bytes - Issue 12
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 10
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber Bytes - Issue 11
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCybersecurity and COVID-19: Opportunities for change in the face of challenge
COVID-19 is not the first and will not be the last pandemic, but it is the first one that has brought the importance of cyber resilience and adaptability in the era of global trade to the forefront of many businesses' minds.
Read moreCyber_Bytes - Issue 8 2020
Welcome to the eighth 2020 edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 9
Welcome to Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreAre you compliant with the new rules in Singapore? Asia? Beyond?
With the implementation of the GDPR in Europe (2018) and the rise of serious cyber-attacks in Asia, many APAC countries are making major changes to their data privacy laws. Navigating the various regulatory regimes can be complex particularly for companies doing business across the region and beyond.
Read moreCyber_Bytes - Issue 7 2020
Welcome to the seventh 2020 edition of Cyber_Bytes, our bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreCyber_Bytes - Issue 6 2020
Welcome to Cyber_Bytes, a round up of key developments in cyber, tech and evolving risks over the first month of 2020.
Read moreCyber_Bytes - Issue 5 2019
Welcome to Cyber_Bytes, a bi-weekly roundup of key developments in cyber, tech and evolving risks.
Read moreNo Deal Brexit – implications for data and privacy law compliance
The Brexit rollercoaster ride continues. At the time of writing, the UK and EU have just announced the agreement of a new withdrawal deal but there are serious doubts about whether it will be backed by Parliament. Despite the requirements of the Benn Act, the risk of the UK leaving the EU without a deal continues to be a concern.
Read morePushing back on APP scams
An Authorised Push Payment (APP) is where a payer instructs their payment service provider, such as their bank, to send money from their account to another. These payments are usually made through the Faster Payment Service or CHAPS.
Read moreStay connected and subscribe to our latest insights and views
Subscribe Here