Firm: All
Practice Industry: Life Sciences, Technology
Region: All
Country/ State: All
Tag: All

What it’s aboutThe Data Privacy Act (Republic Act No. 10173) seeks to protect the confidentiality of “personal information.” The latter is defined as “any information whether recorded in material form or not, from which the identity of an individual is apparent or can be reasonably and directly ascertained by the entity holding the information, or when put together with other information would directly and certainly identify an individual ...

Shoosmiths LLP | January 2024

The launch of our annual conference, Data Insights x Shoosmiths, took place on Wednesday, 24 January 2024 at our offices in London and virtually via live-stream. We were delighted to see a conversation between the titans of data transfer: Privacy Lawyer and Activist at NOYB Max Schrems and French MP Philippe Latombe, followed by a keynote from Barrister, Author and AI visionary Jamie Susskind ...

Deacons | July 2021

On 10 June 2021, the Data Security Law (DSL), which will become effective as of 1 September 2021, was adopted in China. The enactment of the DSL marks the introduction of China’s first fundamental law in the field of data security, which, together with the Cybersecurity Law and the upcoming Personal Information Protection Law, will lay a legal foundation for safeguarding national data security, promoting data utilisation and mitigating the risks of data processing activities ...

Shoosmiths LLP | January 2021

This article forms part of our ‘New How: Perspectives’ report: ‘Can real estate help solve the productivity puzzle?. To access this free report, please click on the download link to the right of this page.   The Covid pandemic has clearly had a significant impact on our society, the economy and everyday life, with numerous sectors having found life in lockdown incredibly challenging ...

ENSafrica | May 2023

With cloud technology becoming increasingly important, data centres provide services critical to many businesses. Given the strategic value of data center to digital transformation, it is essential that data center vendors have a clear plan to manage the risks they face. What are some of the key risks for data center vendors Security Digital and physical security risks have been listed as the top 5 data center security risks for 2023 ...

Shoosmiths LLP | October 2021

In Rolfe v Veale, the High Court awarded summary judgment against claimants who alleged distress following an inadvertent data breach. Here, Philip Tansley and Matthew MacLachlan consider the court's reasoning and the broader implications for such claims ...

Shoosmiths LLP | February 2022

In Stadler v Currys, the High Court awarded summary judgment against a claimant who alleged distress following an inadvertent data breach. Here, Philip Tansley and Kathryn Williamson consider the court's reasoning and the implications of the decision. Introduction The High Court has last week handed down yet another useful judgment for defendants facing claims for breach of UK GDPR, misuse of private information, breach of confidence and negligence as a result of a data breach ...

Shoosmiths LLP | August 2021

The recent Warren v DSG decision may significantly limit the recent wave of data breach litigation by claimant firms. The High Court summarily dismissed claims for breach of confidence, misuse of private information and negligence. Introduction Last week, the High Court handed down judgment in Darren Lee Warren v DSG Retail Limited [2021] EWHC 2168 (QB), a decision that may significantly limit the recent wave of data breach litigation by claimant firms ...

AELEX | July 2020

The COVID-19 pandemic hit the world in an unprecedented manner and, in just a few months, it has had such a profound impact on the world of work. As a result, physical office premises were shut down and many employees were forced to work from home with little or no security policy in place or a viable data backup and recovery plan ...

A primer on burgeoning crypto-asset regulation in Cyprus In Cyprus, the Prevention and Suppression of Money Laundering and Terrorist Financing Law, L188(I)/2007 (the “AML Law”) was amended earlier this year through L13(I)/2021 (the “Amending Law”), in order to harmonise domestic legislation with the provisions of the 4th and 5th AML Directives (Directives (EU) 2015/849 and 2018/843) ...

When was the last time when you or someone you know shared a bad experience or a complaint about a person in Facebook or Twitter?  A good bet is that a longer time has passed than if this question was asked a year ago.  The reason for this is probably Republic Act No. 10175, also known as the Cybercrime Prevention Act of 2012, which President Noynoy Aquino signed into law on September 12, 2012. A ...

On February 1, 2016, the Federal Deposit Insurance Corporation (“FDIC”) published the Winter 2015 issue of Supervisory Insights. Not surprisingly, the first article dealt with the most important issue facing the financial industry today – cybersecurity ...

With only four months left before most changes to the federal Standards for Safeguarding Customer Information (“Safeguards Rule”) – a component of the Gramm-Leach Bliley Act (“GLBA”) that provides for the protection of consumers’ privacy and personal information – take effect, the Federal Student Aid Office is focused squarely on postsecondary educational institutions and third-party servicers, according to its recent announcement ...

as published in West Virginia Banker magazine, Fall 2022 A recent survey by PricewaterhouseCoopers (“PwC”) revealed that U.S. executives now consider cyberattacks the number one risk their companies face. Concerns about cybersecurity have moved beyond the Chief Information Security Officer (“CISO”) to the entire C-suite and corporate boards ...

The onslaught of ransomware attacks by cybercriminals increases unabated every year, affecting everyone from mom and pop shops on Main Street to corporate lions of Wall Street. Hackers infiltrate an organization's computer network through social engineering tactics like phishing emails or by exploiting network security weaknesses, allowing vital digital information to be hijacked and held for ransom ...

Lavery Lawyers | October 2022

While the Canadian government has said it intends to pass legislation dealing with cybersecurity (see Bill C-26 to enact the Critical Cyber Systems Protection Act), many companies have already taken significant steps to protect their IT infrastructure. However, the Internet of Things is too often overlooked in this process. This is in spite of the fact that many devices are directly connected to the most important IT infrastructure for businesses ...

Carey | March 2020

COVID-19 and the restrictions to freedom of movement this sanitary emergency has entailed have substantially accelerated the implementation of telework by companies in Chile and worldwide ...

Carey | May 2023

The latest reforms to Law No. 19,496 Consumer Protection Act, introduced mainly by the "Pro-Consumer" Law and the E-Commerce Regulation, will force companies to be more vigilant in the 2023 version of CyberDay. During the event, which will be held from May 29th to 31st, the National Consumer Service ("SERNAC") will be supervising that companies comply with their e-commerce obligations ...

What it’s aboutThe Cybercrime Prevention Act (Republic Act No. 10175) penalizes “cybercrimes”— acts that fall into any of these major categories:a) offenses against the confidentiality, integrity and availability of computer data and systems (e.g., illegal access, data interference);b) computer-related offenses (e.g., computer-related forgery and fraud);c) content-related offenses (e.g ...

ENSafrica | March 2019

The implementation of cybercrime legislation is a pressing issue given that South Africa has one of the highest numbers of cybercrime victims in the world. In addition, a number of unsuspecting individuals and organisations alike fell prey to the scourge of cyber scams which seemed to spike quite rapidly in the past year. The Cybercrime Bill was adopted by the Portfolio Committee for Justice and Correctional Services in November 2018 and sent to the National Assembly for debate ...

Shoosmiths LLP | September 2020

Sadly, bullying and harassment in the workplace is nothing new. Indeed, a 2020 study found that 15% of people surveyed had been a victim of workplace bullying. Conversely, cyberbullying in the workplace is a relatively new phenomenon but it’s on the rise. What exactly is cyberbullying? Simply put, cyberbullying is any bullying, harassment or victimisation that involves a computer, phone or tablet ...

Deacons | December 2014

Nowadays, we live in an information age (also known as the computer age, digital age or new media age) and the advancement of technologies has facilitated information flow and communication through social media. On one hand, people have easy and quick access to others’ information, enabling interaction with one another. However, the free flow of information and wide participation in social media networks also exposes a person to various risks or dangers ...

Shoosmiths LLP | February 2022

German fuel distributor Mabanaft and its related company Oiltanking Deutschland recently suffered a substantial cyber-attack causing significant disruption to their business operations. In response they declared force majeure on a number of their contracts ...

When you hear the word cyberattack you think of attacks on banks, large box stores, or medical facilities. You should add the construction industry to that list because it is the third most common target for cyberattacks. These types of attacks are only increasing because bad actors have created processes that have streamlined how they attack businesses. They like to attack the construction industry because large sums of money are being transferred in and out of bank accounts via wire transfers ...

dots