The legal tools for dealing with a cyber attack
By Phil Hartley
Late last year, a group of information security experts gathered with government officials to hack into the deep intestinal computers of London’s financial district. The purpose of the exercise, dubbed ‘Waking Shark II’, was to test whether the UK’s banks and stock exchanges — that is to say, the UK financial system — could withstand a major cyber-security attack.
While the exercise was just a simulation, real incidents do occur with astonishing frequency. In January this year, for example, Tony Colston-Hayter, who achieved notoriety in the late 1980s as the foppish progenitor of rave, admitted to conspiring to steal £1.3m by taking control of computer systems at a popular UK high-street bank through a surreptitiously placed desktop device.
The exploitation of weaknesses in an organisation’s IT systems can result not only in significant losses through data theft or reputational damage; it also poses a real risk of civil action or regulatory enforcement and fines. Technical and organisational measures to prevent hacking are necessary not only to shore up defences against data breaches, but also a legal obligation under the seventh data protection principle under the Data Protection Act 1998…
Click on the link below to read the rest of the Schillings briefing.
Sign in or Register to continue reading this article
It's quick, easy and free!
It takes just 5 minutes to register. Answer a few simple questions and once completed you’ll have instant access.Register now
Why register to The Lawyer
In-depth, expert analysis into the stories behind the headlines from our leading team of journalists.
Identify the major players and business opportunities within a particular region through our series of free, special reports.
Receive your pick of The Lawyer's daily and weekly email newsletters, tailored by practice area, region and job function.
More relevant to you
To continue providing the best analysis, insight and news across the legal market we are collecting some information about who you are, what you do and where you work to improve The Lawyer and make it more relevant to you.
News from Schillings
News from The Lawyer
Briefings from Schillings
How companies can ensure their employees’ smartphones don’t become the weakest link.
Vast amounts of our personal information, stored in email and social media accounts, will exist long after our deaths
Analysis from The Lawyer
ABSs arrived just two years ago but their impact on the profession is already deep. In a pre-Awards debate, our shortlisters discuss the rough and smooth of the transition