Information Technology

 

Information Technology

Surprise Court of Appeal judgment leaves Morrisons vicariously liable for huge data breach

The increase of large-scale civil litigation is one undeniable consequence of the recent changes in data protection law. One of the most significant recent actions has followed the data breach by Morrisons supermarket, where a disgruntled former employee...

GDPR new password and encryption guidance published

The Information Commissioner’s Office (ICO) has published guidance about passwords and encryption under GDPR. Where passwords are concerned, the guidance gives comprehensive advice on deciding whether password protection is the best option and, if...

Fines escalate over unsolicited emails and data breaches

The Information Commissioner’s Office (ICO) has fined UK marketing firm Everything DM Ltd. £60,000 for sending well over a million marketing emails without sufficient consent. The emails were sent on behalf of clients and appeared to have come...

What about international data transfers if there is a no-deal Brexit?

The UK government’s Department for Digital, Culture, Media & Sport (DCMS) has published guidance on how our laws will work with EU law once Brexit is complete . The guidance does not cover sector-specific requirements such as law enforcement and...

Majority of UK firms not insured against security breaches and data loss

Current estimates are that annual losses to UK businesses from cybercrime exceed £29 billion. Yet research published in the recent Risk:Value report from NTT Security shows that, whilst 81% of the senior executives surveyed believed that adequate...

CYBERSECURITY SERIES: DATA ANONYMISATION

With the increasing concerns around the data held by organisations, questions around how the new GDPR legislation will be interpreted and the impact that this could have on both customer and supplier, many organisations are turning towards anonymisation...

CYBERSECURITY SERIES: INSURANCE

Organisations can typically take steps to “lay off” cyber risk by a combination of the following: Take preventative mitigation measures – pre-event mitigation Lay off risk to third parties under contract – for example, making...

CYBERSECURITY SERIES: RECEIVING A BREACH NOTIFICATION FROM A SUPPLIER - COMMUNICATING WITH CUSTOMERS

Even if you determine that you don’t have to tell your customers about a data breach, you may still wish to do so for practical/relational/reputational reasons. Under the various laws mentioned above, regulators can in some circumstances compel...

CYBERSECURITY SERIES: RECEIVING A BREACH NOTIFICATION FROM A SUPPLIER - COMPLYING WITH NOTIFICATION OBLIGATIONS

So you’ve received a breach notification from a supplier and have limited information about what’s happened,. You have limited time to determine whether you need to notify regulators / affected organisations and individuals and make those...

Cybersecurity Series: Receiving a breach notification from a supplier - Obtaining information

Having a cyber breach is most organisations’ worst nightmare. It’s considered the number 1 risk in the US, with UK businesses typically listing it in their top two. What’s becoming more apparent is the level of control our suppliers...
  • Page 1 of 3