Information Technology

 

Information Technology

Facing a future of more privacy and group action claims

We mentioned, in a number of our previous posts, that the coming GDPR changes present an increased risk of privacy litigation and ‘group actions’. The focus, to date, has tended to be on the significant fines, for non-compliance. However, the...

Morrisons ruled as vicariously liable for employee's data breach

It’s the story everyone in data protection is talking about. The High Court has ruled that an employer can be vicariously liable for an employee’s misuse of data, even when they can demonstrate that they’ve done as much as reasonably...

SQN Viewpoint: Opportunity or Threat? - Privacy, GDPR and Marketing

In this guest post Chris Ritchie, COO, SQN  offers his views. First published on the European Sponsorship Association blog  on 15th December 2017. As with many things in life, the answer to this question depends on your perspective. It...

PWC Global State of Information Security Survey Report - what you need to know

“Massive cybersecurity breaches have become almost commonplace, regularly grabbing headlines that alarm consumers and leaders. But for all of the attention such incidents have attracted in recent years, many organizations worldwide still struggle to...

Website privacy notices "too vague and generally inadequate"

A review of 30 UK websites, by the Information Commissioner’s Office, has found that the majority of data protection and privacy notices were inadequate. The study looked at organisations across the retail, banking, lending, travel and finance price...

What challenges does GDPR pose to the marketing list industry

Even without the advent of GDPR in May 2018, it is clear that the marketing list industry, which for many years had operated without much in the way of regulatory scrutiny, had caught the information commissioner’s attention. In 2016, the ICO handed...

Cybersecurity: Encryption as a privacy tool

Encryption is an excellent security tool… even if it wasn’t, the UK Information Commissioners’ Office (ICO) sees it as a basic precaution, meaning that is should be on the radar of all data-handling organisations. All security measures...

Cybersecurity: Understanding passwords

If implementing enough cybersecurity to adhere to privacy law is so complex, and massive breaches and software vulnerabilities seem to be reported in the press on a weekly basis, then why are experts quite so preoccupied by the handfuls of jumbled...

Cybersecurity: Understanding the recent Krack vulnerability

A couple of weeks ago we woke up to the news that the technology most of our laptops, smartphones and tablets use to connect to WiFi networks has a major cybersecurity vulnerability [1] . This isn’t something that anyone could have predicted,...
  • Page 1 of 3