Confidential Data in UK Law

In this Topic
Legislation
  • Investigatory Powers Act 2016
    • UK Non-devolved
    • 1 de Enero de 2016
    ... ... interference and the acquisition and retention of communications data, bulk personal datasets and other information; to make provision about the ... a source of journalistic information, and(c) relevant confidential information within the meaning given by paragraph 2(4) of Schedule 7 ... ...
  • Counter-Terrorism and Border Security Act 2019
    • UK Non-devolved
    • 1 de Enero de 2019
    ... ... 2020/792, reg. 2(c) ... 19: Retention of biometric data for counter-terrorism purposes etc ... Schedule 2 contains amendments in ... under sub-paragraph (4) (b) that consists of or includes confidential material only if satisfied that—(a) arrangements are in place that are ... ...
  • Police, Crime, Sentencing and Courts Act 2022
    • UK Non-devolved
    • 1 de Enero de 2022
    ... ... authorise a disclosure of information that—(a) would contravene the data protection legislation (but in determining whether a disclosure would do ... the power in subsection (1) , there is a risk of obtaining confidential information ... (9) The authorised person must, to be satisfied that the ... ...
  • Freedom of Information Act 2000
    • UK Non-devolved
    • 1 de Enero de 2000
    ... ... or by persons providing services for them and to amend the Data Protection Act 1998 and the Public Records Act 1958; and for connected ... (2) Information is also exempt information if it is confidential information obtained from a State other than the United Kingdom or from an ... ...
See all results
Books & Journal Articles
  • Criminal infiltration of financial institutions: a penetration test case study
    • No. 13-1, January 2010
    • Journal of Money Laundering Control
    • 55-65
    Purpose: The purpose of this paper is to discuss the findings of a security research project commissioned by a financial institution to identify security breaches that could facilitate illicit acce...
    ... ... techniques to generateopportunities to steal confidential data, the project simulates a possible criminal attack.Findings – The ... ...
  • Identifying financial patterns of money laundering with social network analysis: a Brazilian case study
    • No. 25-1, January 2022
    • Journal of Money Laundering Control
    • 118-134
    Purpose: This study aims to understand how forensic accountants can analyse bank transactions suspected of being involved with money laundering crimes in Brazil through social network analysis (SNA...
    ... ... limitations/implications –Research found limitations in the data sets with reduced identificationof originators and beneficiaries, ... ...
  • Identifying financial patterns of money laundering with social network analysis: a Brazilian case study
    • No. 25-1, January 2022
    • Journal of Money Laundering Control
    • 0000
    Purpose: This study aims to understand how forensic accountants can analyse bank transactions suspected of being involved with money laundering crimes in Brazil through social network analysis (SNA...
    ... ... limitations/implications –Research found limitations in the data sets with reduced identificationof originators and beneficiaries, ... ...
  • Financial services in trouble: the electronic dimension
    • No. 16-2, May 2009
    • Journal of Financial Crime
    • 180-192
    Purpose: The initial role of computers and information technology (IT) systems consisted of improving business daily's operation. However, this quest of efficiency serves more obscure goals as frau...
    ... ... certainoperations.(3) He falsified documents in order to justify the data processing of fictitious operations.(4) He applied the fictitious ... ...
See all results
Forms
See all results

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT