Privacy and reputation
DLA Piper counts down the top five privacy issues and client concerns seen in the first six months of the operation of the APPs.
For a number of years, one of the most hotly debated topics involving cloud computing has been around the security, confidentiality and integrity of data.
The regulations relating to the licensing and use of orphan works will come into force in October this year.
The European data protection authorities will be conducting a ‘cookie sweep’. Businesses should be checking their websites and cookie notices now to ensure they are compliant and fix any issues.
In July 2014, the House of Lords Communications Committee published a report to inform and stimulate discussion on how the law should respond to offences committed using social media.
Liz Fitzsimons, data privacy expert at Eversheds, has commented on news that some banks will begin to use finger vein technology as a security measure.
Sports, Media and Entertainment Intelligence — broadcasters’ ownership; television advertising; data protection; and more
Sports, Media and Entertainment Intelligence is the global monthly publication from DLA Piper’s sports, media and entertainment group.
The FCC’s declaratory ruling re TCPA vicarious liability — one year later: trends and takeaways download
A year ago, we reported on the FCC’s declaratory ruling about telemarketing robocalls. How has the declaratory ruling been applied since then?
New threat to ‘bring your own device’ policies: employer required to reimburse personal cell phone expenses download
California employers must reimburse employees who are required to use personal mobile phones for work calls for a reasonable percentage of their phone bills.
Our team works with vendors and purchases to mitigate risk, resolve issues and achieve good deals on information technology projects.
Amendments to California’s security breach notification bill head to governor: key action points for businesses download
In what has become almost an annual ritual, California is poised to tweak its security breach notice law.
IP Rights in Data Handbook: protecting and exploiting IP in data, big data and databases internationally download
DLA Piper’s second-edition IP Rights in Data Handbook now covers 20 jurisdictions and includes top tips from local professionals on how best to exploit big data.
It’s happened again. Another hack attack. This time aimed at photos that no-one intended to see the light of day.
Are your photos safe in the Cloud? download
It’s happened again. Another hack attack. This time aimed at photos that no-one intended to see the light of day. Here are the practical steps you can take.
Is your website legal? download
This briefing summarises some of the key information has to be disclosed by website operators.
Dentons highlights lessons that can be learned from the Humphrey case and provides advice for navigating the risks associated with internal investigations in China.
Director, corporate intelligence
As cloud services develop and mature, one of the key differentiators between suppliers is the service-level agreements they are willing to offer.
A new kitemark has been launched to give consumers extra confidence that the apps and websites they are using are secure.
DLA Piper’s privacy experts have compiled a list of dos and don’ts for addressing privacy compliance in M&A transactions.
On 22 July 2014, a new law amending the Law on Data Protection and Law on Information was signed off by the Russian president and thus was officially adopted.
Life Sciences Spotlight: Chinese regulatory enforcement action not slowing down; patent strategies and loyalty discounts; and more download
DLA Piper has released the fourth edition of Life Sciences Spotlight, which discusses developments in the sector across the Asia-Pacific region.
BWB’s public and regulatory law team, headed by Melanie Carter, provides practical and strategic advice and representation for its clients.
Our experienced team has worked on many high-profile defamation and privacy cases.
Just about every job we undertake has something different about it. This makes it easy for us to share our client’s excitement about what they are doing.
Our team operates predominantly in the small to mid-cap market, where we have extensive experience and a client-focused approach.
We advise on how best to safeguard your name, images, logos secrets and products from those seeking to copy, capitalise on or compete unfairly with your work.
Media boutique Michael Simkins and City-based BCL Burton Copeland have been brought in to represent Sir Cliff Richard following a police raid on the star’s home last Thursday (14 August).
No5’s Adrian Keeling has defended Anthony France, 41, from Watford, who is facing charges of conspiracy to commit misconduct in public office.
In 2013, 41 per cent of small firms fell prey to cyber criminals, with another 10 per cent hit by online fraud and 20 per cent affected by a computer virus.
We have a depth of experience across local and central government.
Higher education providers are becoming increasingly popular targets for cyber attacks.
Life Sciences Spotlight: Chinese regulatory enforcement action showing no signs of slowing down; and more download
Welcome to the fourth edition of Life Sciences Spotlight.
The UK Information Commissioner’s Office (ICO) has recently published its annual report. This note highlights key points and potential developments in the regulation of data protection in the UK.
In this article first published in Financier Worldwide, Rod Christie-Miller sets out the steps you can take when untruths start to be spread from behind the shield of a fake identity.
The EU Article 29 Working Party’s guidance on the ‘legitimate interests’ ground for processing personal data download
If a data controller does not have the consent of a data subject to process his or her data, when does the ‘legitimate interest’ condition bite?
We advise clients on all aspects of compliance with Swiss privacy and data protection laws.
The New York Times recently reported that an organised Russian criminal group stole approximately 1.2 billion username and password credentials.
The Australian Privacy Commissioner has found that a suburban Melbourne medical practice has breached the Privacy Act 1988 (Cth).
Using words to battle cyber losses download
Words matter when it comes to cyber security, says Pillsbury’s Brian E Finch.
Mobile payments has been heralded as a growth area in technology, retail and financial services for some time now.
California’s CMIA provides that an individual may recover $1,000 nominal damages based on the negligent release of information by a healthcare provider or other covered party.
This is an Australian-specific alternative chapter on data protection, which was designed to assist organisations operating in Australia with their new privacy responsibilities.
IP rights in data download
Copyright, database right, confidentiality and trademarks are all relevant when considering how data could be protected.
This briefing provides an comparison of the key provisions of the UK Data Protection Act 1998 (DPA) and the Singapore Personal Data Protection Act 2012 (PDPA).
In this webcast, Jonathan Kirsop examines how the UK data protection regime applies to regulate disclosed information.
Protecting confidential information is understandably an important issue for most employers.
In the midst of the gale-force winds of commentary whipped up by the Google case, we should pause and ask ourselves: just how ground-breaking is this decision?
Be Global — July 2014: new gender equality reporting obligations in Australia; meaning of ‘last wage’ clarified in UAE; and more
Be Global is DLA Piper’s snapshot of key global employment law developments designed to help you identify legal hotspots across your global operations.
Having remained fairly static for about 20 years, data protection laws in Europe are on the cusp of their next major overhaul.
A new directive in the EU is set to assist franchisors and franchisees who own confidential business information (such as trade secrets and know-how).
Gillian Duffy has joined Schillings as a senior associate, making her the latest addition to join the firm’s expanding reputation defence practice.
Do cyber attacks affect share price? download
It’s often suggested that a cyber breach can devastate share price. But is this right?
Admiral Mike Rogers, the new leader of the National Security Agency and Cyber Command, certainly has taken a different approach from his predecessor.
The recently reported and much criticised Facebook survey deliberately manipulated almost 700,000 account-holder newsfeeds and monitored the results.
Christopher Graham spoke at the recent Privacy Laws & Business Conference in Cambridge, UK. Here is an update of the main points.
Eversheds recently hosted its annual Technology, Media and Telecoms conference in front of personnel from some of the UK’s largest technology companies.
The risks posed by insider threats download
With the vast tranches of information stored on organisations’ internal networks, the impact of a data breach can be critical for the company involved.
The Secret Service and the Department of Homeland Security have issued a warning to travellers and the hospitality industry about hotel business centres.
Emergency phone and internet data storage laws are set to be brought in by the UK government. Liz Fitzsimons and James Walsh discuss the laws.
Two senior lawyers from Eversheds recently spoke at Practical Law’s inaugural Retail Law Forum.
We have a team of specialist lawyers whose collective experience covers some of the most ground-breaking and eye-catching cases.
One in 10 ex-partners have threatened to expose risqué images of their ex-partner online, with around 20 sites operating in the UK where people can view revenge porn images.
BDK Advokati/Attorneys at Law has submitted to the Serbian commissioner for information of public importance and data protection an analysis of the draft Data Protection Act.
Not just a matter of terminology: disclosure between the US and UK is redefining the role of legal counsel download
Cory Birenbaum and Rod Anderson outline how general counsel and their advisers can prevent their employers from falling afoul of US judges.
Why take the shortcut and settle? download
Many disagreements can be, and often are, negotiated and successfully settled without ever having to start court proceedings.
Execution of search and seizure warrants in criminal matters in respect of electronic data held by persons bound by secrecy rules download
Such measures are not only questionable from the perspective of criminal procedural rules, but also raise serious concerns from a professional secrecy point of view.
The internet as confessional is perhaps a wholly new spiritual approach to how we treat online communities and raises important legal issues for website users and hosts.
George Clooney has released a long statement condemning the Daily Mail for what he claims was a ‘completely fabricated’ article about his fiancée Amal Alamuddin’s mother.
Sports, Media and Entertainment Intelligence — further restriction and rationalisation of Belgium’s gaming industry; and more download
Sports, Media and Entertainment Intelligence is the global monthly publication from DLA Piper’s sports, media and entertainment group.
Social media offers many opportunities for law firms, and yet there is still much reluctance.
The Google ‘right to be forgotten’ ruling and its wider implications for real-estate businesses download
The implications of the Google ruling will be relevant to all types of business — including real-estate businesses.
Employers should be aware of a number of recent developments in the employment law arena.
California courts are clarifying potential liability under the CMIA of healthcare providers, health plans, pharmaceutical companies and others for the unauthorised disclosure of medical information.
Bates Wells Braithwaite has welcomed a decision that establishes the Human Dignity Trust’s activities to protect the human rights of LGBTI people around the world as for the public benefit.
The Russian Parliament has just passed new rules requiring the personal data of Russians to be stored in Russia.
Company law contains a number of measures aimed at protecting the personal details of the individuals involved in a company (such as its directors and shareholders).
Our legal professionals work alongside social media providers and users in relation to commercial, privacy, data, advertising, intellectual property, employment and corporate issues.
Head of commercial technology
Head of IP and litigation
Head of data protection and privacy
The EU Data Protection Regulation was discussed at the Privacy Laws & Business conference in Cambridge, UK.
It looks as if for some the ‘right to be forgotten’ may quickly become a sure-fire way of being remembered.
The New Blue Guide updates the ‘Guide to the implementation of directives based on the New Approach and the Global Approach’ published in 2000.
The Australian privacy commissioner has found that Cupid Media failed to take reasonable steps to secure personal information held on its websites.
The ECJ has ruled that search engines need to remove the link between search results and a web page if it contains information an individual deems should be ‘forgotten’.
Schillings has announced that it has won the inaugural ABS of the Year award at the 2014 Lawyer Awards.
In 1984 libel law was a small but exciting part of the business. We started to carve a reputation for ourselves as experts in libel in what was then an uncrowded marketplace.
On 8 April 2014, the European Court of Justice in the Digital Rights Ireland case declared the Data Retention Directive 2006/24/EC invalid
A search engine operator never forgets... unless you ask it to — the practical challenges of the CJEU Google case decision download
Regulators deliberate as search engine operators work to assemble and implement compliant practices in the wake of the CJEU’s decision in the Google case.
In this article for Lawyer 2B, David Prince sets out everything you need to know about the EU Cyber Security Directive and how delays in implementation are causing uncertainty in the market.
In a landmark judgment, the CJEU has ruled that an individual has the ‘right to be forgotten’ under the Data Protection Directive 95/46/EC.
The Upper Tribunal has handed down its judgment in the Ian Hannam market abuse case. This article summarises some practical consequences from the judgment.
Supreme Court issues new interpretation upsetting established protocol for obtaining internet service subscriber information download
The Supreme Court of Canada issued a landmark decision that upset a common interpretation of a provision of the Personal Information Protection and Electronic Documents Act.
Our team has wide-ranging experience of advising businesses on intellectual property issues relating to fund-raising, mergers and acquisitions, IPOs and technology transfers.
Among the most controversial of the Connected Continent Regulation amendments proposed are those dealing with net neutrality.
The recent High Court case of Warm Zones is a useful reminder for employers of the best steps to take to protect confidential information.
With the rise of celebrity endorsements, like any counterfeit strategy there comes the rise of celebrity false endorsements.
Even a brilliantly executed house move risks being exploited — turning your dream move into a nightmare.
The Court of Justice ruled that individuals can require search engines to rectify, erase or block access to the search engine results about them
The exploitation of weaknesses in an organisation’s IT systems can pose a real risk of civil action or regulatory enforcement and fines.
Google has launched an online form to allow individuals to ask for their personal data to be removed from online search results.
Reputation resilience: a study into the emerging professionalisation of corporate reputational risk management download
Those tasked with protecting corporate reputation find themselves on uncertain ground.
Papers are receiving ‘take-down’ requests following the ruling that determined that anyone can demand the removal of information relating to them from search engines.
Building reputation resilience into any brand requires an ongoing assessment that helps to identify the current and emerging risks.
In this video, John Tracey, Umang Paw and Melissa Suek discuss what leading organisations are doing to manage their information as an asset