Confidential Data in UK Law

In this Topic
  • Investigatory Powers Act 2016
    • UK Non-devolved
    • 1 de Enero de 2016
    ...... interference and the acquisition and retention of communications data, bulk personal datasets and other information; to make provision about the ... (c) (c) relevant confidential information within the meaning given by paragraph 2(4) of Schedule 7 ......
  • Data Protection Act 2018
    • UK Non-devolved
    • 1 de Enero de 2018
    ...... (b) (b) by another person who in the circumstances owes a duty of confidentiality under an enactment or rule of law. . (2) In Article 10 of the GDPR and section 10, references to personal data relating to criminal convictions ......
  • Data Protection Act 1998
    • UK Non-devolved
    • 1 de Enero de 1998
    ......concerned, regard shall be had, in particular, to— . . (a) any duty of. confidentiality owed to the other individual,. . . (b) any steps taken by the data controller with a view to seeking the. consent of the other individual,. . . ......
  • Freedom of Information Act 2000
    • UK Non-devolved
    • 1 de Enero de 2000
    ...... or by persons providing services for them and to amend the Data Protection Act 1998 and the Public Records Act 1958; and for connected ... . (2) Information is also exempt information if it is confidential. information obtained from a State other than the United Kingdom or. from ......
See all results
Books & Journal Articles
  • Criminal infiltration of financial institutions: a penetration test case study
    • Núm. 13-1, Enero 2010
    • Journal of Money Laundering Control
    • 55-65
    Purpose: The purpose of this paper is to discuss the findings of a security research project commissioned by a financial institution to identify security breaches that could facilitate illicit acce...
    ...... techniques to generateopportunities to steal confidential data, the project simulates a possible criminal attack.Findings – The ......
  • External reactive detection v. internal proactive prevention. The holistic approach to integrate change
    • Núm. 20-3, Julio 2013
    • Journal of Financial Crime
    • 287-292
    Purpose: All members of staff up to the Chairman of the Board now get daily briefings of the serious issues within the financial sector. Headlines are commonly quoting regulatory fines, once in the...
    ...... media reports, and is not confirmed by any confidential dataknown to the author.Originality/value – Using case analysis and field work, ......
  • Financial services in trouble: the electronic dimension
    • Núm. 16-2, Mayo 2009
    • Journal of Financial Crime
    • 180-192
    Purpose: The initial role of computers and information technology (IT) systems consisted of improving business daily's operation. However, this quest of efficiency serves more obscure goals as frau...
    ...... media and books) and is not confirmed by any confidential dataavailable to the author.Originality/value – Many computer crime experts (re: ......
  • User privacy in the digital library environment: an investigation of policies and preparedness
    • Núm. 24-1/2, Febrero 2003
    • Library Management
    • 44-50
    With digital technology libraries can archive considerable resources of detailed information about their users. This data is generally regarded as confidential between the library and the individua...
    ......DataprotectionAbstractWithdigitaltechnologylibrariescanarchiveconsiderableresourcesofdetailedinformationabouttheirusers... a commitmentto services in digital form may hold manytypes of confidential personal data. Theyinclude: membership files, records of loans ......
See all results
Law Firm Commentaries
See all results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT