Privacy and reputation
The Ashley Madison hack should focus businesses on the policies they have in place to prevent employees damaging their reputations, says Collyer Bristow.
Collyer Bristow discusses what remedies are available to individuals and where employees and employers stand
If you are the head of IT security or the corporate affairs director at one of the companies on the Ashley Madison hack list, what are the immediate things you need to consider?
Work email addresses are included in the data on users uploaded to the dark web.
Law firms must immediately address these five issues.
Schillings’ Reputation Resilience report has established that when it comes to the investment community, a crisis is not necessarily viewed as a sign of weakness.
The human shield of data security download
Good policy is not enough to protect an organisations information because it often ignores the vital element to protecting data in the first place: people.
Order in (and out of) the house: what to do if an employee's behaviour damages your company's reputation download
Hear, hear! Lord Sewel resigned following allegations involving drugs and prostitutes. But what if an employee in similar circumstances doesn’t resign – can you dismiss?
What do UCL and Caffé Nero have in common? Their efforts to restore their reputation made things worse.
Had controversial blog been published in Europe company could have faced claims for defamation and/or breach of privacy.
People are the risk, not just IT download
It recenty cost Morrisons £2m to deal with a data leak by a disgruntled ex-employee. Watch your staff…
Part 36 offers are a tactical way of putting pressure on a party to a settle a dispute, by virtue of the cost sanctions that can flow from failure to accept a reasonable offer.
Regulatory developments across a range of online gaming jurisdictions.
Laws are not being routinely applied due to a lack of practical know-how.
Awkward silences over breakfast; investors’ worries about reputational risk confirmed.
The FBI ’Darkode’ arrests are just the tip of the iceberg. This briefing highlights risks to you in five key areas.
Insufficient safeguards in place to protect information.
More business activity will be caught by the regulation and more information will count as ‘data’ or ‘sensitive data’.
Be like Mark Zuckerberg – consider non-disclosure agreements where luxury properties are involved.
Cyber bullying and cyber privacy download
Revenge porn; Belgium takes on Facebook; and more.
This practice area covers employment agreements and terms, flexible employment relations, boardmembers/directors and remuneration, redundancy and more.
Speak up before being asked download
By Adam Wilkinson
The human factor and cyber security download
From board members to shop floor assistants, people are vulnerable to phishing without proper training
PwC economic crime survey launched download
Assessing corporate attitudes to fraud, particularly when it is cyber crime-related.
Ensure the principle of ‘privacy by design’ is enshrined in everyday business procedures.
ISP ordered to take measures against its subscribers.
We are increasingly asked to share sensitive information with lots of organisations.
Limiting reputational damage download
Once damaging personal information is in the public domain, it is hard to regain control of it.
Reputation aims for AIM listing download
Taking steps to ensure your start-up’s reputation does not become its epitaph.
Europe’s data protection compromise download
Expert calls regulation based on one-stop-shop an “illusion”.
Lost in Myspace download
Keen to stop yesterday’s photos becoming today’s gossip? Remove old social media profiles for good. It’s relatively straightforward.
During a Queen’s Speech debate in the House of Lords on 3rd June 2015, Baroness Kidron has set out some of the initial findings stemming from Schillings’ legal assessment for the iRights framework.
Individuals and businesses should be prepared for the threat wearable technology poses with regards to privacy and data protection.
The Italian Data Protection Authority has started, along with other 28 privacy authorities around the world, a ‘sweep investigation’ on the online privacy of children.
The Italian Data Protection Authority adopted the General Resolution, which states the modalities to be used by website managers.
Online profiling: more protection for the users' privacy and clear rules to be complied with download
Whoever works on the internet must provide the users with clear and complete information, and require and obtain the data subjects’ consent.
Data Issues Roundup – 28 May 2015: ICO issues a penalty sum; Belgian Data Protection Agency warns Facebook; and more download
Also: ICO publishes review on data sharing; and Italian Data Protection Authority extends the scope of online profiling by ‘valuable’ guidelines.
the Italian Data Protection Authority has decided to launch a public consultation in order to evaluate The ‘Internet of Things’
Also; it is now a criminal offence to require an employee or prospective employee to provide the records on their criminal convictions.
On 21 May, Keith Schilling, chairman and senior partner at Schillings, read a Statement in Open Court following a successful libel claim.
The judgment represents a turning point in the phone-hacking litigation, says Collyer Bristow’s Steven Heffer
Rodoljub Sabic and Aleksandar Resanovic recently discussed personal data protection.
Social media can do an immense amount of good but we have also seen what happens when it goes wrong. Recently a number of cases have involved social media users.
The battle for your digital pocket/wallet, wrist and biometric data is on and everyone wants to help you pay in a more mobile/digital way.
Data Issues Roundup, 12 May: US cyber security laws; move to stop organisations blocking publications; and more download
Also: settlements with retail tracking company and pharmacy; CII best practice guide.
NOW TV: Supreme Court confirms that passing-off needs ‘goodwill’ in the UK, not just reputation download
The UK Supreme Court has confirmed, in Starbucks v B Sky B, that the law on passing off only protects ‘goodwill’ within the territory of the UK, not mere reputation.
This week’s pick of top writers from TheLawyer.com’s IT, data and privacy briefings
Following a hugely successful FY14/15, Schillings is pleased to announce seven new hires to its privacy and reputation legal practice, in addition to three new hires to its risk consulting and information security practices.
Data Issues Roundup, 5 May: UK to extend security agencies’ powers; EU biometric data ruling; and more download
Also: Ireland to be privacy regulator for 300 million non-US Twitter users; responses to Big Data report; and more.
Data Issues Roundup, 29 April: China/US dataflows; Twitter falls under EU control; and more download
Also: cultural differences could wreck the single EU data protection law dream; data protection authorities face resource challenges due to digital boom; and more.
Privacy law and young people download
Guidance on issues in Australia plus legislative developments and interesting court decisions in other countries.
Most advertising platforms and social networks now offer targeted services…
Lithuania plans to oblige public establishments to provide data about their stakeholders (personal data, value of contributions etc).
Also: Obama signs order ’blocking the property of persons engaging in malicious cyber-enabled activities; and more.
Last year the Data Retention Law was declared unconstitutional as it violated the right to privacy. A legal framework for data protection is in place.
Landmark judgment clarifies the law on misuse of private information.
Your conference call dial-in number can become known or guessed. (After all, some numbers are hard to forget, such as Jenny/867-5309, according to Tommy Tutone.) Here’s how to avoid problems.
Preparing for a dawn raid download
External counsel can help raided companies decide, say, whether to file for leniency. Bernhard Lauterburg of Prager Dreifuss is one of the experts on the panel in this Q&A article.
Clarification on promotional offers, the ‘loyalisation’ of consumers and spam matters in Italy.
Data Issues Roundup, 20 April; AT&T's $25m privacy settlement; Facebook case in Austria; Google loses out in Germany; and more download
Also, UCAS gives data protection undertaking’.
The way a company protects its reputation has a direct bearing on how City analysts and investors determine the value of the business.
The new offence of cyber crime that causes material damage to human welfare or national security is punishable by life.
Court kills off controversial Section 66A.
Politics and social media are an incendiary combination, and 2015 is likely to be the UK’s first truly digital-led general election.
A cyber attack could cost a business its investor backing, according to new figures.
The email as administrative document download
If documents contain sensitive data access is allowed only if strictly necessary, and in some cases to disclose information on health status or sex life.
Key takeaways for CEOs, counsel and chief privacy officers about online behavioural advertising download
What organisations should do before moving to an online behavioural advertising model.
Number of threats is now close to a million a day.
Council of Europe recommends that employers should avoid interference with employees’ right to privacy, this being applicable to information technology devices.
Data Issues Roundup, 13 April: Cloud contracts; US crackdown on hackers; nuisance calls fine; and more download
Also; UK court strikes down part of the Data Protection Act; Australia passes ‘retention law’; and more.
A decision of the Italian Data Protection Authority (the ‘Garante”) recently rejected the complaint filed before it by a person who challenged Google’s decision not to de-index an article.
Rory Cullinan’s decision to resign as head of investments at RBS is an important reminder that actions on social media can inadvertently prove the making of a tabloid story.
Google has already paid out millions in the US and agreed to pay millions more, but the UK case will be vigorously defended.
Big Data: is the GCC ready? download
Joby Beretta considers key legal issues arising from the proliferation of Big Data and questions whether the Gulf Co-operation Council legislative framework is prepared for the challenge.
Organisations likely to be affected should urgently revisit their cyber resilience plans.
Data Issues Roundup, 1 April: world leaders’ personal details revealed; US-EU dataflows; and more download
Worldwide update also includes items on Prince Charles’ letters and a code of practice for UK public authorities.
Developments in the cybersecurity regulatory sphere.
AdTech and monetisation update: US privacy bill of rights; Safari security bypass rap; and more download
Developments in the fields of information privacy and online advertising regulations.
JPM and the German-Serbian Business Association (DSW) are hosting a seminar on How to apply the Law on Personal Data Protection on 22 April 2015 at Vladimira Popovica 6, Belgrade.
In our increasingly complex world information security and data misuse is under ever greater scrutiny. One cannot help but wonder if this spike in awareness is a sign of things to come.
Data Issues Roundup, 27 March: unlimited fines; cross-device tracking; a provocateurs database; and more download
Also; South Korea passes world’s first Cloud law; Russia says companies can store personal data abroad; and more.
A third of businesses in the UK are not prepared to deal with a data breach, new research reveals.
Developments in technology like the new Apple Watch mean social media use in the workplace is only likely to increase. Shoosmiths looks at how employers should deal with it.
Paula Barrett, partner and data protection expert at Eversheds, has commented reports from the ECJ hearing yesterday on the Max Schrems v Data Protection Commissioner case.
Last month Microsoft adopted the first international cloud privacy standard. Could this lead to greater confidence in data security and privacy in cloud computing?
The ICO has served Staysure.co.uk, an online travel insurer, with a £175,000 penalty notice for a serious breach of the security principle of data protection law.
KPMG Australia will acquire Asia Pacific cyber security technology solutions business, First Point Global, as part of a global strategy to expand the firm’s cyber capabilities.
Aim is to put London at the centre of investment in crypto-currency, but all such technologies have major implications for privacy.
Mayer Brown has hired US National Security Agency (NSA) general counsel Rajesh De to lead its privacy and security practice from Washington DC.
Wragge Lawrence Graham & Co’s privacy experts examine the findings of a new report on cookie usage, explain what it might mean for websites in the future and provide their top 10 cookie tips.
A brief overview of four cases in which the firm has helped clients guard their reputation.
Paula Barrett of Eversheds, has commented on news that EU member states are expected to back data protection reforms, that US technology groups have labelled a ‘Eurovision Song Contest’ for regulators.
In Macedonia, the Law on Personal Data Protection governs personal data protection issues. The amended version came into force as of 11 March 2014.
A look at data issues in the UK, Europe and worldwide.
How executives can protect their reputation in a world of online profiles, posts and public records.
In Montenegro there is no specific regulation governing online privacy (including cookies). Accordingly, the general data protection rules are relevant to online privacy too.
The FCA and Prudential Regulation Authority have published a joint consultation on how organisations in the financial services sector should manage internal whistleblowing disclosures.
Compu-Finder did not have consent to send commercial emails promoting management and professional development training courses to businesses.
Data Issues Roundup, February 2015: Visa to track smartphones, revenge porn, UK named worst for data breaches and more download
A look at data issues in the UK, Europe and worldwide.
AdTech and monetisation update: privacy on Google Chrome, native advertising, healthcare apps and more download
Advertising technology and monetisation update, including regulatory developments in the fields of information privacy and online advertising.
Judges ruled again on the point of law concerning the use of evidence obtained by means of remote control systems, aimed at checking the illegal conduct of employees.
In Italy, for the first time in Europe Google is to be subject to regular checks to monitor its progress on bringing its platform into line with domestic legislation.
Whistleblowers in the Swiss banking sector: legal hurdles to co-operating with foreign governments download
An overview of the main Swiss criminal law provisions that prohibit the theft and disclosure of banking information to foreign authorities or courts, and how they have been applied to whistleblowers in recent cases.
Homeland security experts warn of the next wide-scale military offensive beginning with a decisive zero-day cyber attack.
The Ched Evans rape case has polarised opinion, so it’s time for some straight talking.
Employment issues for multinational employers in the New York spotlight.
We thought that we would share some basic data protection tips with those of you who did not see our tweets on International Data Protection Day.
”Successful whistleblowing practices are those that provide easy access to reporting mechanisms and follow-up support. In these areas there is clearly more to be done.”
A bank breached an equitable duty of confidence by using a client’s confidential information for a purpose other than that for which it was supplied, despite the absence of contractual duties of confidence.
NCTM has successfully assisted Nuovo Trasporto Viaggiatori (NTV), the first Italian private rail company on high-speed rails, in a defamation case brought by Ferrovie dello Stato Italiane.
Social media offers huge opportunities for brands to strengthen their reputation and build stronger relationships with their customers and other stakeholders. But it can be a double-edged sword.
Shoe retailer Office commits to addressing issues of data protection.
Such is Dr Raminder Ranger’s success as an entrepreneur that he has received, among other things, an MBE for his services to business.
Competition and Markets Authority issues a call for information on the commercial use of consumer data download
As part of a project to understand how firms collect and use consumer data, the CMA issued a call for information on 27 January 2015 on the commercial use of consumer data.
Data Issues Roundup — death inquiries data lost; Google only removes EU search results; report on Internet of Things; and more download
Addleshaw Goddard has released the 30 January 2015 issue of its Data Issues Roundup.
Medical Innovations Ltd v Eakins was a summary judgment application in litigation between an employee and his former employer.
The House of Commons in Canada is back in session. The federal Conservative Government wasted no time in introducing sweeping anti-terrorism bill (Bill C-51, the Anti-terrorism Act, 2015).
International arbitration expert, Jane Wessel, considers the further avenues open to the litigants in their quest for information from Tripadvisor.
Ryanair flying high at the CJEU download
CJEU rules when the owner of a database is free, subject to national law, to adopt contractual terms and conditions governing its use.
Personalised greeting card company Moonpig has become the latest in a string of companies to hit the headlines because of a flaw in its cyber security.
The CJEU has handed down a ruling that may significantly affect owners of databases of information who wish to restrict how their data is used and those who make use of such databases.
Annual cybersecurity roundup 2014 download
Nicola Fulford and Alex Cravero of Kemp Little look back at the most significant security and data privacy issues of 2014, and consider what we might expect to see in 2015.
The vulnerability of information on digital platforms constitutes an unprecedented risk and the undermining of customer trust goes straight to the bottom line.
Looking across our cyber response engagements there’s a stark – and illuminating – contrast between the UK and US.
Data Issues Roundup — firm warned to stop nuisance text messages; EU ruling on CCTV; ICO's privacy seals; and more download
Addleshaw Goddard has released the 19 January 2014 issue of its Data Issues Roundup .
The OPC stated that it ‘may’ be acceptable to rely on implied or opt-out consent when tracking and targeting individuals for online behavioural advertising purposes.
A dataset is a collection of data that is manipulated by computers to produce relevant information on any given subject matter.
This article examines a recent trend in EU competition law whereby it has become increasingly common for parent entities to be fined for the violations that were perpetrated by their subsidiaries.
Under the Data Protection Acts employers who force subject access requests now commit a criminal offence and there are increased notification obligations on data controllers.
New California laws download
Governor Jerry Brown signed 930 bills during the 2014 session, the most in a single year since he took office in 2011. He also vetoed 143 bills, or about 13 per cent of the total that were sent to him.
Are investor bulletin boards damaging your business? Tips for dealing with the darker side of shareholder activism download
The last 10 years have seen a growing trend of shareholder activism. Shareholders, both institutional and private investors, are increasingly seeking to make their voices heard.
Freedom of expression and privacy in labour disputes: amendments to Alberta’s Personal Information Protection Act in force download
Alberta’s Personal Information Protection Act (PIPA) entered 2015 with a (slightly) new look.
A new cloud privacy standard download
Late last year ISO 27018 was published, covering the processing of personal data in the cloud.
Big data: ICO guidance download
In its paper entitled Big data and data protection published last year the Information Commissioner’s Office provides its view of the issues surrounding big data and privacy.
The rapid development of surveillance technology together with its increased use in a more intrusive and proactive manner has given rise to public concern.
New student data privacy laws: top points for school contractors and K-12 education sites, apps and online services download
According to the Data Quality Campaign, 36 states considered 110 student data privacy bills this year, and 20 states enacted 28 such bills into law.
Assessing reputation risk download
The General Council of a well-respected company recently asked: how do you measure reputation risk? With no singular guidance on the issue, this is a question that many organisations struggle with.
Six Schillings lawyers have been ranked in the 2014 Spear’s Reputation Management Index.
The increased focus of national data protection authorities on the processing of personal data through mobile apps was again confirmed in an open letter from a group of data protection authorities.
A court ruled in the case of a plaintiff who claimed his privacy rights had been violated because Google search engine results of his name included news articles suggesting he had a criminal past.
In today’s digital age, false rumours and misinformation can quickly escalate and impact reputation like never before.
MPs to challenge data laws in court download
Laws that let security organisations tap into internet and telephone records are to be challenged by two MPs.
The Hong Kong privacy commissioner for personal data (PCPD) announced last week that a former insurance agent has received a prison sentence in respect of offences under the Personal Data (Privacy) Ordinance.
According to IBM, 90 per cent of the world’s data was created in the past two years. The rise of ‘wearable technology’ will only serve to increase the levels of data collected.
Sports, Media and Entertainment Intelligence: more good news for the creative sector; product recalls and brand reputation
The December issue of Sports, Media and Entertainment Intelligence discusses brand reputation, broadcasting, data protection, gambling and more.
Employers are prohibited from requesting criminal background checks or clearances, except in specified, sensitive sectors.
Kemp Little’s Nicola Fulford and Kemp Little Consulting’s Jim Odell will be chairing at the 5th Edition Analytics and Big Data Congress.
Section 56 of the Data Protection Act 1998, dormant since the DPA came into force, is expected to be implemented shortly.
UK: privacy and information law update — enforced subject access: a new criminal offence under the Data Protection Act 1998 download
Section 56 of the Data Protection Act 1998 (DPA), dormant since the DPA came into force, is expected to be implemented shortly.
When it comes to protecting sensitive personal data, it would be wrong to consider yourself less vulnerable simply because you don’t tweet or don’t have the latest apps on your smartphone.
The Office of the Privacy Commissioner for Personal Data in Hong Kong (PCPD) has released new Guidance on the Proper Handling of Customers’ Personal Data for the Banking Industry.
The continued dependence on electronic and network-based systems means that all businesses, regardless of their size or area of operation are increasingly exposed to cyber risks.
The report on the intelligence relating to the murder of Lee Rigby raises some complex privacy issues, says Paula Barrett, head of privacy at Eversheds.
Liz Fitzsimons, data privacy expert at Eversheds, has commented on reports of a cyber attack on Sony Pictures.
The University of Birmingham recently released a report outlining that the use of drones within the UK is expected to rise significantly over the next 20 years.
Nicola Fulford, privacy and data protection partner, and Alex Cravero, commercial technology associate, discuss the significance of the Shellshock bugs.
While many practices are focused on improving their digital data security, the security of data in print too often remains a blind spot.
Forty-five per cent of financial services organisations have suffered economic crime during the survey period, compared with only 34 per cent across all other industries.
Hogan Lovells has been appointed by Uber Technologies to conduct an in-depth review of its existing data privacy program following criticism about an Uber executive snooping on a journalist.
Installing a ‘computer program’ on a computer system is prohibited unless the program is installed with consent and complies with disclosure requirements.
On 10 December 2014, Dentons lawyers from around the globe will present on several critical employment issues facing multinational employers.
CASL is a new regime, with significant administrative monetary penalties and is broader in scope than the anti-spam laws of the US and other countries.
BWB Briefing for Charities and Social Enterprises — FAQs for charities on the impact of the Lobbying Act; and more download
Bates Wells Braithwaite has released the 13 November 2014 issue of its BWB Briefing for Charities and Social Enterprises.
Investors are increasingly looking to hedge-fund owners to identify threats and protect their investments.
Beneficial ownership of assets is coming under scrutiny in hedge fund divorce cases, requiring the disclosure of great swathes of confidential information.
Cyber security — blanket? download
Tim Ryan guides us through the cyber-security puzzle with five useful recommendations.
While protecting workplaces from the Ebola virus, employers in the US should comply with federal and state employment discrimination, leave and privacy laws.
The CRTC has released new guidance on the provisions of Canada’s Anti-Spam Legislation (CASL) dealing with the installation of computer programs.
Employment Law Round-up — landmark EAT case on holiday pay; right to privacy in the workplace; TUPE; and more download
In this issue, we look first at the landmark EAT case on holiday pay, which attracted a lot of TV and press attention earlier this month.
DLA Piper has announced that Jeanne Bossi-Malafosse will join the firm in Paris as counsel.
DLA Piper partner Patrick Van Eecke took part in a panel last week aimed at helping Google decide which principles should be used when removing content.
Dealing with today’s cyber threat isn’t simply a question of reviewing your security systems.
Automatic exchange of information download
On 29 October, 51 jurisdictions signed a multilateral agreement to participate in the automatic exchange of information under the Common Reporting Standard.
Sports, Media and Entertainment Intelligence — Google privacy case in Japan; FIFA Women’s World Cup; and more
Sports, Media and Entertainment Intelligence is the global monthly publication from DLA Piper’s sports, media and entertainment group.
This article seeks to share insights as an ‘alert’, so to speak, to the vulnerabilities to watch for in protection of personal information.
Sam Karim of Kings Chambers will be speaking at the 10th EHFCN Conference in Athens on 7 November.
Data Issues Roundup — government increases ICO fining power for nuisance calls and spam messages; and more download
Addleshaw Goddard has released the 4 November 2014 issue of its Data Issues Roundup.
Pillsbury has announced that public policy lawyer Mercedes Tunstall is set to join the firm’s Washington DC office.
What can and should an organisation do if they are persistently being targeted by a particular opponent online or offline?
Tips from a former privacy regulator download
Chantal Bernier provides five tips that can benefit companies in responding to a privacy regulator.
Defamation claims issued in 2013 decreased 24 per cent and statistics on privacy injunctions (not claims) for the first half of 2014 show an even greater decline.
Memery Crystal’s employment team is set to host a breakfast panel discussion — ‘Social media: what employers need to consider’.
A study published recently by PwC shows that many organisations lack both clear leadership and strategies for tackling the security threats they face.
The commissioner of lobbying, pursuant to powers in the Lobbying Act, has published a revised code of conduct and invited written submissions on these proposed revisions.
BYOD smartphones and tablets are the ‘Achilles heel’ of the IT security of most organisations and are the technology most often involved in cyber attacks.
‘Turning the tables on the stalkers’ will focus on the implications for service providers and the effectiveness of current legislation and policing.
Justice secretary Chris Grayling has outlined government proposals to quadruple the current six-month sentence for people found guilty of internet trolling.
Individuals and businesses need to begin assessing the risk of their data being misused, not by the person they’re sending images to but by hackers who may attempt to steal their data.
Data breaches are personal download
The recent hacking of celebrity images and those belonging to Snapchat users show that individuals are not immune to targeted cyber attacks.
UK and Europe: prioritising privacy download
Law firms and clients that are caught unaware of changes to international data protection legislation risk heavy fines.
Social media is an ever-increasing area of litigation. Facebook users spend more than 10.5 billion minutes per day on the website, for example.
E-health and fitness/wellness applications are being investigated and potentially sanctioned by the Italian data protection authority.
This article briefly surveys risks from the US healthcare perspective when companies choose to adopt a BYOD policy.
Kemp Little has become a 2015 FinTech50 partner. FinTech50 recognises businesses in Europe’s technology sector for their innovation.
Schillings scooped three awards at this year’s Modern Law Awards for ‘Law Firm of the Year’, ‘ABS of the Year’ and ‘Non-Lawyer of the Year’.
Data Issues Roundup — ICO issues new code of practice; ‘revenge porn’ to become offence; and more download
Addleshaw Goddard has released the 16 October 2014 issue of its Data Issues Roundup, which provides a weekly round-up of data issues.
Orange was represented by Dr Arwid Mednis, head of the privacy, information and communication technologies team and electronic communications team.
Schillings has won the most innovative law firm in corporate strategy award at the 2014 FT Innovative Lawyers Awards.
Pillsbury has assembled a new team to help clients with their global security strategy and compliance needs.
In a new book published by Harvard University Press, Hate Crimes in Cyber Space, Prof Danielle Citron lays her prescription for tackling the ‘awful internet’.
The increased use of video as a publishing tool has reputation implications for individuals and businesses alike.
Banks launch fresh cybercrime drive download
Financial Fraud Action UK has published figures showing that internet and telephone banking fraud increased 59 per cent to £35.9m during the first six months of 2014.
The Technology Leaders Forecast Survey is a poll of more than 200 technology executives and investors developed by DLA Piper and PitchBook.
Dentons Canada has announced that Chantal Bernier, former interim privacy commissioner of Canada, has joined the firm’s privacy and security practice as counsel.
One positive that has come out of the recent wave of uncomfortably private photos being brandished is that not everyone wants to look at them.
Sports, Media and Entertainment Intelligence — French legislation on evening advertising on public channels; and more
The October issue of Sports, Media and Entertainment Intelligence discusses evening advertising on public channels, gambling, paid television and more.
Following testing in the US of driverless cars and the announcement in the UK that cars will be tested here from the start of next year, the debate around autonomous vehicles has intensified.
The real threat from a data breach is not the incident itself, but the lasting damage it can cause to your reputation.
Election advertising download
Partner Rupert Earle and paralegal Andrew Wheelhouse explain the restrictions on election advertising.
Rupert Earle and Mark Scodie explain the limits of freedom of expression, given that the circulation of untrue information may distort the electoral process.
FAA grants exemptions and releases guidance for operation of small unmanned aircraft systems download
On 25 September 2014, the FAA approved six exemption requests for the use of small unmanned aircraft systems for television and movie filmmaking under strict conditions.
A derogatory comment posted on a social networking site will be defamatory if it contains an untrue imputation against the employer that serves to undermine the reputation of the organisation.
EU data protection laws apply to ‘personal data’ in the broadest sense. A business email sent by an employee from the office constitutes ‘personal data’ as long as the email identifies an individual.
There is now a clear public expectation that every sizeable consumer-facing business will have a social media presence of some sort.
MOrsel: in business, it’s not what you know, it’s who you know — Nautech Services Ltd v CSS Ltd and Ors download
The Royal Court in Jersey has held that a business’s client contact information, stored on a database, is protected by laws of confidentiality and copyright.
A global survey published by the Global Privacy Enforcement Network has found an alarming degree of data privacy failings among mobile apps.
Cybercrime is one of the fastest-growing criminal activities on the planet. It covers a huge range of illegal activity including financial scams and computer hacking.
The following commentary provides a brief overview of the short to medium term changes expected in the post-referendum environment.
The News of the World has admitted being responsible for intercepting the voicemails of many individuals using the services of Glenn Mulcaire, prior to his arrest in 2006.
£4m boost to UK’s cyber security download
A new £4m funding programme will boost the UK’s cyber security, while making it easier for companies to thrive online, it is hoped.
Shoosmiths has hosted an all-day event for London-based procurement professionals and in-house lawyers
Intellectual Property and Technology News — service integration in the technology and sourcing space; and more download
Intellectual Property and Technology News (Asia Pacific) is a biannual publication from DLA Piper that offers perspectives, analysis and visionary ideas.
WesPay has announced that Pillsbury partner Deborah S Thoren-Peden is the recipient of the Frank E Zima Award for Payments Advocacy.
Charities can be exempted from most of the provisions of the Data Protection Act, when they handle personal information in order to publish certain reports.
BWB Briefing for Charities and Social Enterprises — Electoral Commission publishes update for non-party campaigners; and more download
Bates Wells Braithwaite has released the latest issue of its BWB Briefing for Charities and Social Enterprises.
Data Issues Roundup — new Irish data protection commissioner appointed; Racing Post falls short on IT security; and more download
Addleshaw Goddard has released the 15 September 2014 issue of its Data Issues Roundup publication.
A report issued by WP 29 has raised concerns regarding certain limitations in Québec’s scheme of protection for personal information.
The UK DMA has released a code of practice to address consumer concerns around data privacy and UK marketing practices.
Members of the Global Privacy Enforcement Network (GPEN) have released the results of the network’s May 2014 privacy sweep.
Google has met with privacy experts in an attempt to nail down its policy regarding the recent ‘right to be forgotten’ legal ruling.
DLA Piper counts down the top five privacy issues and client concerns seen in the first six months of the operation of the APPs.
For a number of years, one of the most hotly debated topics involving cloud computing has been around the security, confidentiality and integrity of data.
The regulations relating to the licensing and use of orphan works will come into force in October this year.
The European data protection authorities will be conducting a ‘cookie sweep’. Businesses should be checking their websites and cookie notices now to ensure they are compliant and fix any issues.
In July 2014, the House of Lords Communications Committee published a report to inform and stimulate discussion on how the law should respond to offences committed using social media.
Liz Fitzsimons, data privacy expert at Eversheds, has commented on news that some banks will begin to use finger vein technology as a security measure.
Sports, Media and Entertainment Intelligence — broadcasters’ ownership; television advertising; data protection; and more
Sports, Media and Entertainment Intelligence is the global monthly publication from DLA Piper’s sports, media and entertainment group.
The FCC’s declaratory ruling re TCPA vicarious liability — one year later: trends and takeaways download
A year ago, we reported on the FCC’s declaratory ruling about telemarketing robocalls. How has the declaratory ruling been applied since then?
New threat to ‘bring your own device’ policies: employer required to reimburse personal cell phone expenses download
California employers must reimburse employees who are required to use personal mobile phones for work calls for a reasonable percentage of their phone bills.
Our team works with vendors and purchases to mitigate risk, resolve issues and achieve good deals on information technology projects.
Amendments to California’s security breach notification bill head to governor: key action points for businesses download
In what has become almost an annual ritual, California is poised to tweak its security breach notice law.
IP Rights in Data Handbook: protecting and exploiting IP in data, big data and databases internationally download
DLA Piper’s second-edition IP Rights in Data Handbook now covers 20 jurisdictions and includes top tips from local professionals on how best to exploit big data.
It’s happened again. Another hack attack. This time aimed at photos that no-one intended to see the light of day.
Are your photos safe in the Cloud? download
It’s happened again. Another hack attack. This time aimed at photos that no-one intended to see the light of day. Here are the practical steps you can take.
Is your website legal? download
This briefing summarises some of the key information has to be disclosed by website operators.
Dentons highlights lessons that can be learned from the Humphrey case and provides advice for navigating the risks associated with internal investigations in China.
Director, Corporate Intelligence
As cloud services develop and mature, one of the key differentiators between suppliers is the service-level agreements they are willing to offer.
A new kitemark has been launched to give consumers extra confidence that the apps and websites they are using are secure.
DLA Piper’s privacy experts have compiled a list of dos and don’ts for addressing privacy compliance in M&A transactions.
On 22 July 2014, a new law amending the Law on Data Protection and Law on Information was signed off by the Russian president and thus was officially adopted.
Life Sciences Spotlight: Chinese regulatory enforcement action not slowing down; patent strategies and loyalty discounts; and more download
DLA Piper has released the fourth edition of Life Sciences Spotlight, which discusses developments in the sector across the Asia-Pacific region.
BWB’s public and regulatory law team, headed by Melanie Carter, provides practical and strategic advice and representation for its clients.
Our experienced team has worked on many high-profile defamation and privacy cases.
Just about every job we undertake has something different about it. This makes it easy for us to share our client’s excitement about what they are doing.
Our team operates predominantly in the small to mid-cap market, where we have extensive experience and a client-focused approach.
We advise on how best to safeguard your name, images, logos secrets and products from those seeking to copy, capitalise on or compete unfairly with your work.
Media boutique Michael Simkins and City-based BCL Burton Copeland have been brought in to represent Sir Cliff Richard following a police raid on the star’s home last Thursday (14 August).
No5’s Adrian Keeling has defended Anthony France, 41, from Watford, who is facing charges of conspiracy to commit misconduct in public office.
In 2013, 41 per cent of small firms fell prey to cyber criminals, with another 10 per cent hit by online fraud and 20 per cent affected by a computer virus.
We have a depth of experience across local and central government.
Higher education providers are becoming increasingly popular targets for cyber attacks.
Life Sciences Spotlight: Chinese regulatory enforcement action showing no signs of slowing down; and more download
Welcome to the fourth edition of Life Sciences Spotlight.
The UK Information Commissioner’s Office (ICO) has recently published its annual report. This note highlights key points and potential developments in the regulation of data protection in the UK.
In this article first published in Financier Worldwide, Rod Christie-Miller sets out the steps you can take when untruths start to be spread from behind the shield of a fake identity.
The EU Article 29 Working Party’s guidance on the ‘legitimate interests’ ground for processing personal data download
If a data controller does not have the consent of a data subject to process his or her data, when does the ‘legitimate interest’ condition bite?
We advise clients on all aspects of compliance with Swiss privacy and data protection laws.
The New York Times recently reported that an organised Russian criminal group stole approximately 1.2 billion username and password credentials.
The Australian Privacy Commissioner has found that a suburban Melbourne medical practice has breached the Privacy Act 1988 (Cth).
Using words to battle cyber losses download
Words matter when it comes to cyber security, says Pillsbury’s Brian E Finch.
Mobile payments has been heralded as a growth area in technology, retail and financial services for some time now.
California’s CMIA provides that an individual may recover $1,000 nominal damages based on the negligent release of information by a healthcare provider or other covered party.
This is an Australian-specific alternative chapter on data protection, which was designed to assist organisations operating in Australia with their new privacy responsibilities.
IP rights in data download
Copyright, database right, confidentiality and trademarks are all relevant when considering how data could be protected.
This briefing provides an comparison of the key provisions of the UK Data Protection Act 1998 (DPA) and the Singapore Personal Data Protection Act 2012 (PDPA).
In this webcast, Jonathan Kirsop examines how the UK data protection regime applies to regulate disclosed information.
Protecting confidential information is understandably an important issue for most employers.
In the midst of the gale-force winds of commentary whipped up by the Google case, we should pause and ask ourselves: just how ground-breaking is this decision?
Be Global — July 2014: new gender equality reporting obligations in Australia; meaning of ‘last wage’ clarified in UAE; and more
Be Global is DLA Piper’s snapshot of key global employment law developments designed to help you identify legal hotspots across your global operations.
Having remained fairly static for about 20 years, data protection laws in Europe are on the cusp of their next major overhaul.
A new directive in the EU is set to assist franchisors and franchisees who own confidential business information (such as trade secrets and know-how).
Gillian Duffy has joined Schillings as a senior associate, making her the latest addition to join the firm’s expanding reputation defence practice.
Do cyber attacks affect share price? download
It’s often suggested that a cyber breach can devastate share price. But is this right?
Admiral Mike Rogers, the new leader of the National Security Agency and Cyber Command, certainly has taken a different approach from his predecessor.
The recently reported and much criticised Facebook survey deliberately manipulated almost 700,000 account-holder newsfeeds and monitored the results.
Christopher Graham spoke at the recent Privacy Laws & Business Conference in Cambridge, UK. Here is an update of the main points.
Eversheds recently hosted its annual Technology, Media and Telecoms conference in front of personnel from some of the UK’s largest technology companies.
The risks posed by insider threats download
With the vast tranches of information stored on organisations’ internal networks, the impact of a data breach can be critical for the company involved.
The Secret Service and the Department of Homeland Security have issued a warning to travellers and the hospitality industry about hotel business centres.
Emergency phone and internet data storage laws are set to be brought in by the UK government. Liz Fitzsimons and James Walsh discuss the laws.
Two senior lawyers from Eversheds recently spoke at Practical Law’s inaugural Retail Law Forum.
We have a team of specialist lawyers whose collective experience covers some of the most ground-breaking and eye-catching cases.
One in 10 ex-partners have threatened to expose risqué images of their ex-partner online, with around 20 sites operating in the UK where people can view revenge porn images.
BDK Advokati/Attorneys at Law has submitted to the Serbian commissioner for information of public importance and data protection an analysis of the draft Data Protection Act.
Not just a matter of terminology: disclosure between the US and UK is redefining the role of legal counsel download
Cory Birenbaum and Rod Anderson outline how general counsel and their advisers can prevent their employers from falling afoul of US judges.
Why take the shortcut and settle? download
Many disagreements can be, and often are, negotiated and successfully settled without ever having to start court proceedings.
Execution of search and seizure warrants in criminal matters in respect of electronic data held by persons bound by secrecy rules download
Such measures are not only questionable from the perspective of criminal procedural rules, but also raise serious concerns from a professional secrecy point of view.
The internet as confessional is perhaps a wholly new spiritual approach to how we treat online communities and raises important legal issues for website users and hosts.
George Clooney has released a long statement condemning the Daily Mail for what he claims was a ‘completely fabricated’ article about his fiancée Amal Alamuddin’s mother.
Sports, Media and Entertainment Intelligence — further restriction and rationalisation of Belgium’s gaming industry; and more download
Sports, Media and Entertainment Intelligence is the global monthly publication from DLA Piper’s sports, media and entertainment group.
Social media offers many opportunities for law firms, and yet there is still much reluctance.
The Google ‘right to be forgotten’ ruling and its wider implications for real-estate businesses download
The implications of the Google ruling will be relevant to all types of business — including real-estate businesses.
Employers should be aware of a number of recent developments in the employment law arena.
California courts are clarifying potential liability under the CMIA of healthcare providers, health plans, pharmaceutical companies and others for the unauthorised disclosure of medical information.
Bates Wells Braithwaite has welcomed a decision that establishes the Human Dignity Trust’s activities to protect the human rights of LGBTI people around the world as for the public benefit.
The Russian Parliament has just passed new rules requiring the personal data of Russians to be stored in Russia.
Company law contains a number of measures aimed at protecting the personal details of the individuals involved in a company (such as its directors and shareholders).
Our legal professionals work alongside social media providers and users in relation to commercial, privacy, data, advertising, intellectual property, employment and corporate issues.
Head of commercial technology
Head of IP and litigation
Head of data protection and privacy
The EU Data Protection Regulation was discussed at the Privacy Laws & Business conference in Cambridge, UK.
It looks as if for some the ‘right to be forgotten’ may quickly become a sure-fire way of being remembered.
The New Blue Guide updates the ‘Guide to the implementation of directives based on the New Approach and the Global Approach’ published in 2000.
The Australian privacy commissioner has found that Cupid Media failed to take reasonable steps to secure personal information held on its websites.
The ECJ has ruled that search engines need to remove the link between search results and a web page if it contains information an individual deems should be ‘forgotten’.
Schillings has announced that it has won the inaugural ABS of the Year award at the 2014 Lawyer Awards.
In 1984 libel law was a small but exciting part of the business. We started to carve a reputation for ourselves as experts in libel in what was then an uncrowded marketplace.
On 8 April 2014, the European Court of Justice in the Digital Rights Ireland case declared the Data Retention Directive 2006/24/EC invalid
A search engine operator never forgets... unless you ask it to — the practical challenges of the CJEU Google case decision download
Regulators deliberate as search engine operators work to assemble and implement compliant practices in the wake of the CJEU’s decision in the Google case.
In this article for Lawyer 2B, David Prince sets out everything you need to know about the EU Cyber Security Directive and how delays in implementation are causing uncertainty in the market.
In a landmark judgment, the CJEU has ruled that an individual has the ‘right to be forgotten’ under the Data Protection Directive 95/46/EC.
The Upper Tribunal has handed down its judgment in the Ian Hannam market abuse case. This article summarises some practical consequences from the judgment.
Supreme Court issues new interpretation upsetting established protocol for obtaining internet service subscriber information download
The Supreme Court of Canada issued a landmark decision that upset a common interpretation of a provision of the Personal Information Protection and Electronic Documents Act.
Our team has wide-ranging experience of advising businesses on intellectual property issues relating to fund-raising, mergers and acquisitions, IPOs and technology transfers.
Among the most controversial of the Connected Continent Regulation amendments proposed are those dealing with net neutrality.
The recent High Court case of Warm Zones is a useful reminder for employers of the best steps to take to protect confidential information.
With the rise of celebrity endorsements, like any counterfeit strategy there comes the rise of celebrity false endorsements.
Even a brilliantly executed house move risks being exploited — turning your dream move into a nightmare.
The Court of Justice ruled that individuals can require search engines to rectify, erase or block access to the search engine results about them
The exploitation of weaknesses in an organisation’s IT systems can pose a real risk of civil action or regulatory enforcement and fines.
Google has launched an online form to allow individuals to ask for their personal data to be removed from online search results.
Reputation resilience: a study into the emerging professionalisation of corporate reputational risk management download
Those tasked with protecting corporate reputation find themselves on uncertain ground.
Papers are receiving ‘take-down’ requests following the ruling that determined that anyone can demand the removal of information relating to them from search engines.
Building reputation resilience into any brand requires an ongoing assessment that helps to identify the current and emerging risks.
Compliance with AML, Know Your Customer and sanctions regulatory requirements dominated the financial services landscape in 2013. This looks set to continue in 2014.
In this video, John Tracey, Umang Paw and Melissa Suek discuss what leading organisations are doing to manage their information as an asset
In this Dispute Perspective, we explore the issues and consider some of the implications for case strategy and quantum assessment.