Firm: All
Practice Industry: Retail & Distribution, Technology
Region: All
Country/ State: All
Tag: All
Shoosmiths LLP | March 2022

What we know about the cybersecurity risks arising from the Ukraine, steps UK organisations should consider taking now, the insurance position and novel issues that might arise from Ukraine-linked cyber attacks. What has been happening? A few weeks into the war in Ukraine the cybersecurity implications for companies in the UK remain unclear, but some trends are emerging: Initial state sponsored activity seems purely to be targeted by Russian groups at Ukraine and vice versa ...

Thank you so much for joining us in this interview series! Before we dig in, our readers would like to get to know you. Can you tell us a bit about how you grew up? I grew up in a small town of about 3,500 in rural North Carolina, nestled in the middle of the Uwharrie National Forest. Like many small towns, it fostered a close-knit community of people who supported and encouraged me to dream big ...

Arendt & Medernach | April 2021

In a recent article published in écho, WSG Member Astrid Wagner, Partner, IP Communication & Technology at Arendt & Medernach, provides insight on the growing risk of damage to information systems in cyber attacks and what cyber protection measures should be taken ...

"The Package” The day begins like any other. Your client opens for business at 9:00 a.m. All employees are at their desks as customers begin calling, emailing, and walking in with various questions and needs. Except this time, when the employees attempt to access customer records from your client’s computer network, they immediately notice something is wrong. None of the customer files will open. The data is a garbled mess ...

When you hear the word cyberattack you think of attacks on banks, large box stores, or medical facilities. You should add the construction industry to that list because it is the third most common target for cyberattacks. These types of attacks are only increasing because bad actors have created processes that have streamlined how they attack businesses. They like to attack the construction industry because large sums of money are being transferred in and out of bank accounts via wire transfers ...

Shoosmiths LLP | February 2022

German fuel distributor Mabanaft and its related company Oiltanking Deutschland recently suffered a substantial cyber-attack causing significant disruption to their business operations. In response they declared force majeure on a number of their contracts ...

Deacons | December 2014

Nowadays, we live in an information age (also known as the computer age, digital age or new media age) and the advancement of technologies has facilitated information flow and communication through social media. On one hand, people have easy and quick access to others’ information, enabling interaction with one another. However, the free flow of information and wide participation in social media networks also exposes a person to various risks or dangers ...

Shoosmiths LLP | September 2020

Sadly, bullying and harassment in the workplace is nothing new. Indeed, a 2020 study found that 15% of people surveyed had been a victim of workplace bullying. Conversely, cyberbullying in the workplace is a relatively new phenomenon but it’s on the rise. What exactly is cyberbullying? Simply put, cyberbullying is any bullying, harassment or victimisation that involves a computer, phone or tablet ...

ENSafrica | March 2019

The implementation of cybercrime legislation is a pressing issue given that South Africa has one of the highest numbers of cybercrime victims in the world. In addition, a number of unsuspecting individuals and organisations alike fell prey to the scourge of cyber scams which seemed to spike quite rapidly in the past year. The Cybercrime Bill was adopted by the Portfolio Committee for Justice and Correctional Services in November 2018 and sent to the National Assembly for debate ...

What it’s aboutThe Cybercrime Prevention Act (Republic Act No. 10175) penalizes “cybercrimes”— acts that fall into any of these major categories:a) offenses against the confidentiality, integrity and availability of computer data and systems (e.g., illegal access, data interference);b) computer-related offenses (e.g., computer-related forgery and fraud);c) content-related offenses (e.g ...

Carey | May 2023

The latest reforms to Law No. 19,496 Consumer Protection Act, introduced mainly by the "Pro-Consumer" Law and the E-Commerce Regulation, will force companies to be more vigilant in the 2023 version of CyberDay. During the event, which will be held from May 29th to 31st, the National Consumer Service ("SERNAC") will be supervising that companies comply with their e-commerce obligations ...

Carey | March 2020

COVID-19 and the restrictions to freedom of movement this sanitary emergency has entailed have substantially accelerated the implementation of telework by companies in Chile and worldwide ...

Lavery Lawyers | October 2022

While the Canadian government has said it intends to pass legislation dealing with cybersecurity (see Bill C-26 to enact the Critical Cyber Systems Protection Act), many companies have already taken significant steps to protect their IT infrastructure. However, the Internet of Things is too often overlooked in this process. This is in spite of the fact that many devices are directly connected to the most important IT infrastructure for businesses ...

The onslaught of ransomware attacks by cybercriminals increases unabated every year, affecting everyone from mom and pop shops on Main Street to corporate lions of Wall Street. Hackers infiltrate an organization's computer network through social engineering tactics like phishing emails or by exploiting network security weaknesses, allowing vital digital information to be hijacked and held for ransom ...

as published in West Virginia Banker magazine, Fall 2022 A recent survey by PricewaterhouseCoopers (“PwC”) revealed that U.S. executives now consider cyberattacks the number one risk their companies face. Concerns about cybersecurity have moved beyond the Chief Information Security Officer (“CISO”) to the entire C-suite and corporate boards ...

With only four months left before most changes to the federal Standards for Safeguarding Customer Information (“Safeguards Rule”) – a component of the Gramm-Leach Bliley Act (“GLBA”) that provides for the protection of consumers’ privacy and personal information – take effect, the Federal Student Aid Office is focused squarely on postsecondary educational institutions and third-party servicers, according to its recent announcement ...

On February 1, 2016, the Federal Deposit Insurance Corporation (“FDIC”) published the Winter 2015 issue of Supervisory Insights. Not surprisingly, the first article dealt with the most important issue facing the financial industry today – cybersecurity ...

When was the last time when you or someone you know shared a bad experience or a complaint about a person in Facebook or Twitter?  A good bet is that a longer time has passed than if this question was asked a year ago.  The reason for this is probably Republic Act No. 10175, also known as the Cybercrime Prevention Act of 2012, which President Noynoy Aquino signed into law on September 12, 2012. A ...

A primer on burgeoning crypto-asset regulation in Cyprus In Cyprus, the Prevention and Suppression of Money Laundering and Terrorist Financing Law, L188(I)/2007 (the “AML Law”) was amended earlier this year through L13(I)/2021 (the “Amending Law”), in order to harmonise domestic legislation with the provisions of the 4th and 5th AML Directives (Directives (EU) 2015/849 and 2018/843) ...

AELEX | July 2020

The COVID-19 pandemic hit the world in an unprecedented manner and, in just a few months, it has had such a profound impact on the world of work. As a result, physical office premises were shut down and many employees were forced to work from home with little or no security policy in place or a viable data backup and recovery plan ...

Shoosmiths LLP | August 2021

The recent Warren v DSG decision may significantly limit the recent wave of data breach litigation by claimant firms. The High Court summarily dismissed claims for breach of confidence, misuse of private information and negligence. Introduction Last week, the High Court handed down judgment in Darren Lee Warren v DSG Retail Limited [2021] EWHC 2168 (QB), a decision that may significantly limit the recent wave of data breach litigation by claimant firms ...

Shoosmiths LLP | February 2022

In Stadler v Currys, the High Court awarded summary judgment against a claimant who alleged distress following an inadvertent data breach. Here, Philip Tansley and Kathryn Williamson consider the court's reasoning and the implications of the decision. Introduction The High Court has last week handed down yet another useful judgment for defendants facing claims for breach of UK GDPR, misuse of private information, breach of confidence and negligence as a result of a data breach ...

Shoosmiths LLP | October 2021

In Rolfe v Veale, the High Court awarded summary judgment against claimants who alleged distress following an inadvertent data breach. Here, Philip Tansley and Matthew MacLachlan consider the court's reasoning and the broader implications for such claims ...

dots